00:00 +0: loading test\core\bitswap\bitswap_service_test.dart
00:00 +0: test\core\bitswap\bitswap_service_test.dart: BitswapService convertToProtoBlock converts Block to proto
00:00 +1: test\core\bitswap\bitswap_service_test.dart: BitswapService convertFromProtoBlock converts proto to Block
00:00 +2: test\core\blockstore_test.dart: Block Tests should create from data
00:00 +3: test\core\blockstore_test.dart: Block Tests should serialize to/from proto
00:00 +4: test\core\blockstore_test.dart: Block Tests should serialize to/from bitswap proto
00:00 +5: test\core\blockstore_test.dart: BlockStore Tests should start and stop
00:00 +6: test\core\blockstore_test.dart: BlockStore Tests should put and get block
00:00 +7: test\core\blockstore_test.dart: BlockStore Tests should fail to get non-existent block
00:00 +8: test\core\blockstore_test.dart: BlockStore Tests should remove block
00:00 +9: test\core\blockstore_test.dart: BlockStore Tests should get all blocks
00:00 +10: test\core\blockstore_test.dart: BlockStore Tests should get status
00:00 +11: test\core\block_dag_test.dart: Block fromData computes CID and stores data
00:00 +12: test\core\block_dag_test.dart: Block validate returns true for correct data
00:00 +13: test\core\block_dag_test.dart: Block validate returns false for corrupted data
00:00 +14: test\core\block_dag_test.dart: Block validateSync performs structural checks
00:00 +15: test\core\block_dag_test.dart: Block operator == and hashCode deep dive
00:00 +16: test\core\block_dag_test.dart: Block proto roundtrip
00:00 +17: test\core\block_dag_test.dart: Block Bitswap and raw bytes conversion
00:00 +18: test\core\block_dag_test.dart: MerkleDAGNode create and toBytes/fromBytes
00:00 +19: test\core\block_dag_test.dart: MerkleDAGNode cid property computation
00:00 +20: test\core\block_dag_test.dart: MerkleDAGNode toString and HAMTShard coverage
00:00 +21: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:30:53.260309 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:00 +22: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:00 +22: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:30:53.309274 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:30:53.312272 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:30:53.312272 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:30:53.313273 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:30:53.313779 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:30:53.314147 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:30:53.315670 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:30:53.315670 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:30:53.316669 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:01 +23: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:01 +24: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:01 +25: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:01 +26: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:01 +26: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:30:53.430799 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:30:53.430799 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:30:53.430799 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:30:53.432358 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:30:53.433087 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:30:53.435119 [FINE] [MDNSHandler] [DEBUG] MDNSHandler instance created
00:01 +27: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:01 +28: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:01 +28: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:30:53.491561 [FINE] [Libp2pRouter] [DEBUG] Registered protocol pubsub
2026-02-02T15:30:53.494868 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:30:53.495872 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:30:53.496376 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.496376 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.497880 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.497880 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.498904 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:30:53.498904 [FINE] [BootstrapHandler] [DEBUG] Creating new BootstrapHandler instance
2026-02-02T15:30:53.501412 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler instance created
2026-02-02T15:30:53.502501 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:30:53.504008 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
2026-02-02T15:30:53.506132 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
00:01 +29: test\core\car_full_test.dart: CAR Utilities Deep Coverage CarReader/Writer edge cases
00:01 +30: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node with customized services
00:01 +31: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node with customized services
00:01 +31: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:30:53.536477 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:30:53.537477 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:30:53.537982 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:30:53.537982 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:30:53.537982 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:30:53.538986 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:30:53.538986 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:30:53.538986 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:30:53.538986 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:30:53.549936 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:30:53.549936 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:30:53.551442 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:30:53.552448 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:30:53.552448 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:30:53.553453 [FINE] [MDNSHandler] [DEBUG] MDNSHandler instance created
2026-02-02T15:30:53.554451 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:30:53.554451 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:30:53.554451 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.555452 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.555452 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.555452 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:30:53.555452 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:30:53.555452 [FINE] [BootstrapHandler] [DEBUG] Creating new BootstrapHandler instance
2026-02-02T15:30:53.556450 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler instance created
2026-02-02T15:30:53.556450 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:30:53.556450 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
00:01 +32: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder validates required services
00:01 +33: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Initialization creates reader with byte list
00:01 +34: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +35: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +36: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +37: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +38: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +39: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +40: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +41: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +42: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes reads multiple bytes at once
00:01 +43: test\core\cbor\byte_reader_test.dart: ByteReader readByte throws at end
00:01 +44: test\core\cbor\byte_reader_test.dart: ByteReader readByte throws at end
00:01 +45: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes reads zero bytes
00:01 +46: test\core\cbor\byte_reader_test.dart: ByteReader readBytes returns correct sublist
00:01 +47: test\core\cbor\byte_reader_test.dart: ByteReader readBytes returns correct sublist
00:01 +48: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes sequential readBytes calls
00:01 +49: test\core\cbor\byte_reader_test.dart: ByteReader readBytes throws if not enough
00:01 +50: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes mixed readByte and readBytes
00:01 +51: test\core\cbor\byte_reader_test.dart: ByteReader isBreak detects 0xFF
00:01 +52: test\core\cbor\byte_reader_test.dart: ByteReader isBreak detects 0xFF
00:01 +53: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak returns false when next byte is not 0xFF
00:01 +54: test\core\cbor\byte_reader_test.dart: ByteReader hasRemaining and remaining
00:01 +55: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak returns false when no bytes remaining
00:01 +56: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak isBreak after consuming bytes
00:01 +57: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak isBreak does not consume byte
00:01 +58: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests remaining returns all bytes initially
00:01 +59: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests remaining returns remaining after reading
00:01 +60: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests remaining returns empty list when all consumed
00:01 +61: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining returns true when bytes available
00:01 +62: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining returns false when all bytes consumed
00:01 +63: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining returns false for empty reader
00:01 +64: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining updates after each read
00:01 +65: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests position tracks read position accurately
00:01 +66: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests position position equals length when all consumed
00:01 +67: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases handles large byte arrays
00:01 +68: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases handles all-zero bytes
00:01 +69: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases handles all-max bytes
00:01 +70: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases single byte reader
00:01 +71: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Error Conditions readBytes with negative count throws
00:01 +72: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Error Conditions multiple reads past end all throw
00:02 +73: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Tags cborTags contains correct mappings
00:02 +74: test\core\cid_coverage_test.dart: CID Coverage Expansion encode/decode (string representation)
00:02 +75: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +76: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +77: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +78: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +79: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +80: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +81: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +82: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +83: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +84: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +85: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:02 +86: test\core\cid_coverage_test.dart: CID Coverage Expansion codec with multi-byte varint
00:02 +87: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes BYTES (Tag 45)
00:02 +88: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes BYTES (Tag 45)
00:02 +89: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes CID LINK (Tag 6)
00:02 +90: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes CID V1 LINK (Tag 6)
00:02 +91: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:02 +92: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler MerkleDAG Conversion convertFromMerkleDAGNode correctly shapes IPLDMap
00:02 +93: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler MerkleDAG Conversion convertToMerkleLink converts IPLDNode map back to Link
00:02 +94: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler MerkleDAG Conversion convertToMerkleLink handles hash as bytes (legacy)
00:02 +95: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler MerkleDAG Conversion convertToMerkleLink throws if not MAP
00:02 +96: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Error Handling convertCborValueToIPLDNode throws on unsupported type
00:02 +97: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Tag 42 (DAG-PB) Decoding decodes DAG-PB tag correctly
00:02 +98: test\core\cid_test.dart: CID v0 creates valid CIDv0
00:02 +99: test\core\cid_test.dart: CID v1 creates valid CIDv1 with different codecs
00:02 +100: test\core\cid_test.dart: CID toBytes and fromBytes round trip
00:02 +101: test\core\cid_test.dart: CID toBytes throws on unsupported codec
00:02 +102: test\core\cid_test.dart: CID validate returns true for valid CIDs
00:02 +103: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation computeForDataSync creates CID from data
00:02 +104: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation computeForDataSync with different codecs
00:02 +105: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation same data produces same CID
00:02 +106: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation different data produces different CIDs
00:02 +107: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding encode and decode round-trip
00:02 +108: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding toString returns encoded string
00:02 +109: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding decode handles CIDv0 format (Qm prefix)
00:02 +110: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding decode throws on empty string
00:02 +111: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding toBytes returns Uint8List
00:02 +112: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding fromBytes round-trip
00:02 +113: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding fromBytes throws on empty bytes
00:02 +114: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties version property is accessible
00:02 +115: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties codec property is accessible
00:02 +116: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties multihash property exists
00:02 +117: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties validate returns true for valid CID
00:02 +118: test\core\cid_verified_test.dart: CID - Verified API Tests CID Comparison equality operator works
00:02 +119: test\core\cid_verified_test.dart: CID - Verified API Tests CID Comparison inequality works
00:02 +120: test\core\cid_verified_test.dart: CID - Verified API Tests CID Comparison identical CIDs are equal
00:02 +121: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles empty data
00:02 +122: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles large data
00:02 +123: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles binary data
00:02 +124: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles UTF-8 special characters
00:02 +125: test\core\cid_verified_test.dart: CID - Verified API Tests Codec Variations raw codec
00:02 +126: test\core\cid_verified_test.dart: CID - Verified API Tests Codec Variations dag-pb codec
00:02 +127: test\core\cid_verified_test.dart: CID - Verified API Tests Codec Variations dag-cbor codec
00:02 +128: test\core\cid_verified_test.dart: CID - Verified API Tests fromContent Factory creates CID from content
00:02 +129: test\core\cid_verified_test.dart: CID - Verified API Tests fromContent Factory fromContent with custom codec
00:02 +130: test\core\cid_verified_test.dart: CID - Verified API Tests fromContent Factory fromContent with custom hash
00:02 +131: test\core\cid_verified_test.dart: CID - Verified API Tests Protobuf Conversion toProto converts to protobuf
00:02 +132: test\core\cid_verified_test.dart: CID - Verified API Tests Protobuf Conversion fromProto round-trip
00:02 +133: test\core\config\config_test.dart: MetricsConfig defaults
00:02 +134: test\core\config\config_test.dart: MetricsConfig fromJson/toJson
00:02 +135: test\core\config\config_test.dart: StorageConfig defaults
00:02 +136: test\core\config\config_test.dart: StorageConfig helpers
00:03 +137: test\core\config\config_test.dart: StorageConfig fromJson/toJson
00:03 +138: test\core\config\config_test.dart: NetworkConfig defaults
00:03 +139: test\core\config\config_test.dart: NetworkConfig fromJson/toJson
00:03 +140: test\core\config\config_test.dart: IPFSConfig defaults
00:03 +141: test\core\config\config_test.dart: IPFSConfig withDefaults factory
00:03 +142: test\core\config\config_test.dart: IPFSConfig fromJson/toJson
00:03 +143: test\core\config\ipfs_config_test.dart: IPFSConfig default constructor values
00:03 +144: test\core\config\ipfs_config_test.dart: IPFSConfig withDefaults factory
00:03 +145: test\core\config\ipfs_config_test.dart: IPFSConfig toJson / fromJson roundrip
00:03 +146: test\core\config\ipfs_config_test.dart: IPFSConfig fromJson with empty Map
00:03 +147: test\core\config\ipfs_config_test.dart: IPFSConfig fromFile - YAML support
00:03 +148: test\core\config\metrics_config_test.dart: MetricsConfig default values
00:03 +149: test\core\config\metrics_config_test.dart: MetricsConfig default values
00:03 +150: test\core\config\metrics_config_test.dart: MetricsConfig toJson and fromJson roundtrip
00:03 +151: test\core\config\metrics_config_test.dart: MetricsConfig fromJson with empty Map
00:03 +152: test\core\config\network_config_test.dart: NetworkConfig defaults are correct
00:03 +153: test\core\config\network_config_test.dart: NetworkConfig fromJson parses correctly
00:03 +154: test\core\config\network_config_test.dart: NetworkConfig toJson and fromJson work correctly
00:03 +155: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey derives consistent key from password and salt
00:04 +156: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey derives different keys with different salts
00:04 +157: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey derives different keys with different passwords
00:04 +158: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey supports custom key length
00:04 +159: test\core\crypto\crypto_utils_test.dart: CryptoUtils encrypt/decrypt encrypts and decrypts data correctly
00:04 +160: test\core\crypto\crypto_utils_test.dart: CryptoUtils encrypt/decrypt produces different ciphertext each time (random nonce)
00:04 +161: test\core\crypto\crypto_utils_test.dart: CryptoUtils encrypt/decrypt fails to decrypt with wrong key
00:04 +162: test\core\crypto\crypto_utils_test.dart: CryptoUtils encrypt/decrypt rejects key of wrong size
00:04 +163: test\core\crypto\crypto_utils_test.dart: CryptoUtils zeroMemory zeros buffer contents
00:04 +164: test\core\crypto\crypto_utils_test.dart: CryptoUtils zeroMemory handles empty buffer
00:04 +165: test\core\crypto\crypto_utils_test.dart: CryptoUtils randomBytes generates bytes of correct length
00:04 +166: test\core\crypto\crypto_utils_test.dart: CryptoUtils randomBytes generates different bytes each call
00:04 +167: test\core\crypto\crypto_utils_test.dart: CryptoUtils constantTimeEquals returns true for equal buffers
00:04 +168: test\core\crypto\crypto_utils_test.dart: CryptoUtils constantTimeEquals returns false for different buffers
00:04 +169: test\core\crypto\crypto_utils_test.dart: CryptoUtils constantTimeEquals returns false for different length buffers
00:04 +170: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:04 +171: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair with seed
00:04 +172: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair with invalid seed length
00:04 +173: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer keyPairFromSeed
00:04 +174: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer keyPairFromSeed with invalid seed length
00:04 +175: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer sign and verify roundtrip
00:04 +176: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer verify failure with wrong data
00:04 +177: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer verify failure with catch path
00:04 +178: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer extractPublicKeyBytes
00:04 +179: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer extractSeed
00:04 +180: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer publicKeyFromBytes
00:04 +181: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer publicKeyFromBytes invalid length
00:04 +182: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer KeyPairExtensions.extractSeedAndZero
00:04 +183: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeyEntry toJson serializes correctly
00:04 +184: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeyEntry fromJson deserializes correctly
00:04 +185: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle isUnlocked is false by default
00:04 +186: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +187: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +188: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +189: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +190: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +191: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +192: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +192: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.592360 [SEVERE] [DatastoreHandler] [ERROR] Error storing block with CID bbkujcby5qyrbjr7a4csnpx5gitfx3sjbhvza6ize3sngkjfmzdn4ffocv: Exception: Put failed
2026-02-02T15:30:57.603859 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +193: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +193: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.607842 [SEVERE] [DatastoreHandler] [ERROR] Error retrieving block with CID QmSomeCid: Exception: Get failed
2026-02-02T15:30:57.609275 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +194: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +194: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.619283 [SEVERE] [DatastoreHandler] [ERROR] Error checking existence of block with CID QmSomeCid: Exception: Has failed
2026-02-02T15:30:57.620282 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +195: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +195: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.621628 [SEVERE] [DatastoreHandler] [ERROR] Error initializing datastore: Exception: Init failed
2026-02-02T15:30:57.622633 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +196: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +196: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.623647 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
2026-02-02T15:30:57.625151 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +197: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +197: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.629538 [SEVERE] [DatastoreHandler] [ERROR] Error loading pinned CIDs: Exception: Query failed
2026-02-02T15:30:57.630458 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +198: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +198: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.632473 [SEVERE] [DatastoreHandler] [ERROR] Error persisting pinned CIDs: Exception: Query failed
2026-02-02T15:30:57.632473 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +199: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +199: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.636539 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +200: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +200: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:30:57.638045 [SEVERE] [DatastoreHandler] [ERROR] Error retrieving block with CID QmSomeCid: Exception: Get failed
2026-02-02T15:30:57.639056 [SEVERE] [DatastoreHandler] [ERROR] Error exporting CAR file for CID QmSomeCid: Invalid argument(s): Root block not found for CID: QmSomeCid
2026-02-02T15:30:57.640559 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:05 +201: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +202: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +203: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +204: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +205: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +206: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +207: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +208: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +209: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +210: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +211: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +212: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +213: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +214: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +215: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +216: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +217: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +218: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +219: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +220: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +221: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +222: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +223: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +224: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +225: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +226: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +227: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +228: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +229: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +230: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +231: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +232: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +233: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +234: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +235: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +236: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +237: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +238: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +239: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +240: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +241: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +242: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +243: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +244: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +245: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +246: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +247: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +248: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +249: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +250: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +251: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +252: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +253: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +254: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +255: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +256: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +257: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +258: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +259: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +260: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +261: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +262: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +263: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +264: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +265: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +266: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +267: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +268: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +269: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +270: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +271: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +272: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:08 +273: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:08 +274: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:08 +275: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:08 +276: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:08 +277: test\core\data_structures_test.dart: Pin Tests should create and serialize
00:08 +278: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +279: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +280: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +281: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +282: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +283: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +284: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +285: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +286: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +287: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +288: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +289: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +290: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +291: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +292: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +293: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +294: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +295: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +296: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +297: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +298: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +299: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +300: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +301: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +302: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +303: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +304: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +305: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +306: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +307: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +308: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +309: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +310: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +311: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +312: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +313: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +314: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +315: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +316: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +317: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +318: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +319: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +320: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +321: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +322: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +323: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +324: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +325: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +326: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:11 +327: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +327: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:31:03.460251 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:31:03.477539 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: example.com
2026-02-02T15:31:03.478556 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:31:03.479579 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:31:03.508983 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink.io/
2026-02-02T15:31:03.509982 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: example.com
00:11 +328: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +328: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:31:03.526506 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:31:03.527650 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: cached.com
2026-02-02T15:31:03.527650 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:31:03.528156 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:31:03.528156 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink.io/
2026-02-02T15:31:03.529160 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: cached.com
2026-02-02T15:31:03.530994 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: cached.com
2026-02-02T15:31:03.532455 [FINE] [DNSLinkHandler] [VERBOSE] Returning cached DNSLink for: cached.com
00:11 +329: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +329: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:31:03.536200 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:31:03.536200 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: fallback.com
2026-02-02T15:31:03.536200 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:31:03.537707 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:31:03.538785 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink-resolver.example.com/
2026-02-02T15:31:03.539336 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink-resolver.example.com/
2026-02-02T15:31:03.539847 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink-resolver.example.com/
2026-02-02T15:31:03.539847 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: fallback.com
00:11 +330: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +330: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:31:03.543029 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:31:03.543661 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: failed.com
2026-02-02T15:31:03.543661 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:31:03.544175 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:31:03.544716 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink-resolver.example.com/
2026-02-02T15:31:03.545220 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink-resolver.example.com/
2026-02-02T15:31:03.545220 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://ipfs.io/api/v0/dns/
2026-02-02T15:31:03.546234 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://ipfs.io/api/v0/dns/
2026-02-02T15:31:03.546234 [WARNING] [DNSLinkHandler] [WARNING] Failed to resolve DNSLink for domain: failed.com
00:11 +331: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +331: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:31:03.552744 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:31:03.553742 [FINE] [DNSLinkHandler] [DEBUG] Starting DNSLinkHandler...
2026-02-02T15:31:03.553742 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler started successfully
2026-02-02T15:31:03.554743 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: test.com
2026-02-02T15:31:03.554743 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:31:03.554743 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:31:03.555742 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink.io/
2026-02-02T15:31:03.555742 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: test.com
2026-02-02T15:31:03.556741 [FINE] [DNSLinkHandler] [DEBUG] Stopping DNSLinkHandler...
2026-02-02T15:31:03.556741 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler stopped successfully
00:11 +332: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +333: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +334: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +335: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +335: test\core\ipfs_node\ipld_handler_test.dart: IPLDHandler Codecs put/get raw bytes
2026-02-02T15:31:04.136254 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:04.143353 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:04.144353 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
00:11 +336: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +336: test\core\ipfs_node\ipld_handler_test.dart: IPLDHandler Codecs put/get raw bytes
2026-02-02T15:31:04.153015 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:04.153015 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
00:11 +337: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +338: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +339: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +340: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +341: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +342: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +343: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +344: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +345: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +346: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +347: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +348: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +349: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +350: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +351: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +352: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +353: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +354: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +355: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +356: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +357: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:12 +358: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +358: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:31:04.792601 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:04.808854 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:04.808854 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:04.808854 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:04.810362 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:31:04.810362 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:04.811420 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:31:04.811420 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:31:04.813364 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:31:04.813364 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:31:04.815455 [FINE] [NetworkHandler] [DEBUG] Starting network services...
2026-02-02T15:31:04.816459 [FINE] [NetworkHandler] [VERBOSE] Initializing router...
2026-02-02T15:31:04.816459 [FINE] [NetworkHandler] [VERBOSE] Router started successfully
2026-02-02T15:31:04.816459 [FINE] [NetworkHandler] [VERBOSE] Initializing circuit relay client...
2026-02-02T15:31:04.819518 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client started successfully
2026-02-02T15:31:04.819518 [FINE] [NetworkHandler] [VERBOSE] Registering AutoNAT dialback protocol handler
2026-02-02T15:31:04.820518 [FINE] [NetworkHandler] [DEBUG] AutoNAT dialback handler registered
2026-02-02T15:31:04.820518 [INFO] [NetworkHandler] [INFO] Network services started successfully
2026-02-02T15:31:04.824572 [FINE] [NetworkHandler] [DEBUG] Stopping network services...
2026-02-02T15:31:04.828095 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client stopped
2026-02-02T15:31:04.828095 [FINE] [NetworkHandler] [VERBOSE] Router stopped
2026-02-02T15:31:04.829623 [FINE] [NetworkHandler] [VERBOSE] Network event subscriptions canceled
2026-02-02T15:31:04.830133 [FINE] [NetworkHandler] [VERBOSE] Network event controller closed
2026-02-02T15:31:04.830133 [INFO] [NetworkHandler] [INFO] Network services stopped successfully
00:12 +359: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +359: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:31:04.854210 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:04.854729 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:04.854729 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:04.855240 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:04.855240 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
00:12 +360: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +360: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:31:04.864277 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:04.864277 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:04.865281 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:04.865281 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:04.865787 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
00:12 +361: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +361: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:31:04.877929 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:04.879434 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:04.880439 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:04.880439 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:04.880439 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
00:12 +362: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +362: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:31:04.887988 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:04.888497 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:04.888497 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:04.888497 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:04.888497 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:31:04.888497 [FINE] [NetworkHandler] [VERBOSE] Testing direct connection to: /ip4/127.0.0.1/tcp/4001
2026-02-02T15:31:04.890002 [FINE] [NetworkHandler] [DEBUG] Successfully tested direct connection to: /ip4/127.0.0.1/tcp/4001
00:12 +363: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +363: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:31:04.893525 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:04.894155 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:04.894155 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:04.894661 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:04.894661 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:31:04.895680 [FINE] [NetworkHandler] [VERBOSE] Starting dialback test
2026-02-02T15:31:04.899206 [FINE] [NetworkHandler] [DEBUG] Dialback test completed successfully
00:12 +364: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +365: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +366: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +366: test\core\ipfs_node\node_handlers_test.dart: RoutingHandler start/stop delegates to ContentRouting
2026-02-02T15:31:05.294518 [INFO] [MDNSHandler] [INFO] MDNSHandler started successfully
2026-02-02T15:31:05.309325 [INFO] [MDNSHandler] [INFO] MDNSHandler stopped successfully
00:12 +367: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +367: test\core\ipfs_node\node_handlers_test.dart: RoutingHandler start/stop delegates to ContentRouting
2026-02-02T15:31:05.319628 [INFO] [MDNSHandler] [INFO] MDNSHandler started successfully
00:12 +368: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:13 +368: test\core\ipfs_node\node_handlers_test.dart: RoutingHandler start/stop delegates to ContentRouting
2026-02-02T15:31:05.328645 [INFO] [AutoNATHandler] [INFO] NAT detected but port mapping is disabled in config
2026-02-02T15:31:05.329213 [INFO] [AutoNATHandler] [INFO] AutoNATHandler started successfully
2026-02-02T15:31:05.330372 [INFO] [NatTraversalService] [INFO] Removing port mappings for port 4001...
2026-02-02T15:31:05.331948 [INFO] [AutoNATHandler] [INFO] AutoNATHandler stopped successfully
00:13 +369: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:13 +370: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:13 +370: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:31:05.727711 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:05.761924 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:31:05.761924 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:31:05.763429 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.763429 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.763429 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:31:05.787546 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:05.788051 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:05.792089 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:05.796236 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:05.799805 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:13 +371: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:13 +371: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:31:05.817152 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:05.819215 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:31:05.819215 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:31:05.819215 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.819215 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.820214 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:31:05.821213 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:05.822213 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:05.822213 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:13 +372: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should find providers via DHT
00:13 +373: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +373: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:31:05.868757 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:05.870262 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:31:05.870262 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:31:05.871282 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.871282 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.871282 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:31:05.872787 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:05.873791 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:05.873791 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:13 +374: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +374: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:31:05.880788 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:05.880788 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:31:05.880788 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:31:05.882621 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.882621 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.882621 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:31:05.883640 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:05.884640 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:05.885144 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:13 +375: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +375: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:31:05.887676 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:05.887676 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:31:05.889025 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:31:05.889025 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.889025 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.889025 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:31:05.890025 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:05.890529 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:05.890529 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:13 +376: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +376: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:31:05.896524 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:05.896524 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:31:05.896524 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:31:05.897531 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.897531 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:05.898037 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
00:13 +377: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +377: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:06.268468 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:06.291880 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:06.292385 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:06.293388 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:06.293388 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:06.294388 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:06.297415 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:06.312778 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:06.313777 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:06.314281 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:06.316347 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:13 +378: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:14 +378: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:06.327030 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:06.327720 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:06.328224 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:06.328224 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:06.328224 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:06.328727 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:06.328727 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:06.364375 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:06.364375 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:06.365386 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:06.365386 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +379: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:14 +379: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:06.379848 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:06.381942 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:06.383461 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:06.383461 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:06.384466 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:06.384466 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:06.384971 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:06.388721 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:06.388721 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:06.388721 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:06.388721 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +380: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:14 +380: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:06.398254 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:06.399761 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:06.399761 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:06.399761 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:06.400765 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:06.400765 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:06.400765 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:06.446582 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:06.447588 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:06.447588 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:06.447588 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +381: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:14 +381: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:06.454759 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:06.457364 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:06.457364 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:06.457364 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:06.457364 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:06.458364 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:06.458364 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:06.473135 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:06.473135 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:06.473135 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:06.474140 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +382: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:14 +382: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:06.478823 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:06.479854 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:06.479854 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:06.480369 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:06.480369 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:06.480369 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:06.480369 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:14 +383: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should return null for missing content
00:15 +384: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should return null for missing content
00:17 +385: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should return null for missing content
00:17 +386: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should return null for missing content
00:18 +387: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should return null for missing content
00:19 +388: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should return null for missing content
00:20 +388: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.459330 [WARNING] [HttpGatewayClient] [WARNING] Failed to retrieve CID nonexistentcid from all gateways
2026-02-02T15:31:12.460333 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.460333 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.460333 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.460333 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +389: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +389: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.463197 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.464215 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.464215 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.465214 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.465214 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.465214 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.465214 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.466539 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.internal
2026-02-02T15:31:12.466539 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.public
2026-02-02T15:31:12.466539 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.local
2026-02-02T15:31:12.466539 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.custom
2026-02-02T15:31:12.466539 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.466539 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.467544 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.467544 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +390: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +390: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.471549 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.473055 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.473055 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.474060 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.474060 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.474060 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.474060 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.476570 [SEVERE] [IPFSNode] [ERROR] Failed to publish: Bad state: PubSubHandler not available
2026-02-02T15:31:12.480077 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.480077 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.481078 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.482078 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +391: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +391: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.488076 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.488076 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.488076 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.489076 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.489076 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.489076 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.489076 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.490081 [SEVERE] [IPFSNode] [ERROR] Failed to connect to peer: Bad state: NetworkHandler not available
2026-02-02T15:31:12.491082 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.491082 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.494622 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.494622 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +392: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +392: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.498620 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.499947 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.499947 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.499947 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.499947 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.499947 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.499947 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.500953 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.501961 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.501961 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.501961 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +393: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +393: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.502973 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.504489 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.504489 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.504489 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.504489 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.504489 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.506014 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.509033 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.509033 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.509033 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.509033 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +394: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +394: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.512846 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.513846 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.513846 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.514351 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.514351 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.514351 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.514351 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.514351 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.514351 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.515355 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.515355 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +395: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +395: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.516868 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.517898 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.517898 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.518898 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.518898 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.518898 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.518898 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.518898 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.519993 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.519993 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.519993 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +396: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +396: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.522053 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.522053 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.522053 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.523063 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.523063 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.523063 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.523063 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.526250 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.526250 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.526250 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.526250 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +397: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +397: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.528918 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.530203 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.530203 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.530785 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.530785 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.530785 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.530785 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.530785 [SEVERE] [IPFSNode] [ERROR] Failed to resolve IPNS: Exception: Service not registered: DHTHandler
2026-02-02T15:31:12.530785 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.530785 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.532296 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.532296 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +398: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +398: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.533568 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.535074 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.535074 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.536596 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.536596 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.536596 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.536596 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.536596 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.536596 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.536596 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.537613 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
2026-02-02T15:31:12.537613 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.537613 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.537613 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.537613 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +399: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +399: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:31:12.539121 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.539121 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.540626 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:12.540626 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:12.540626 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:12.541143 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:12.541143 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:12.541143 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:12.541143 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:12.541143 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:12.542379 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +400: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +400: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:31:12.954013 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:12.977540 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:12.980172 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:13.036727 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770067872928
2026-02-02T15:31:13.036727 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:13.038234 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:13.038234 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:13.039757 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:13.044373 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:13.044373 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:13.055135 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:13.055135 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:13.056135 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +401: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +401: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:31:13.060579 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:13.061975 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:13.063484 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:13.083317 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770067873058
2026-02-02T15:31:13.083317 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:13.083317 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:13.083317 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:13.084372 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:13.164576 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:13.165621 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:13.191822 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:13.191822 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:13.192343 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +402: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +402: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:31:13.195354 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:13.196354 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:13.197354 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:13.227563 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770067873193
2026-02-02T15:31:13.228563 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:13.228563 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:13.228563 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:13.229563 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:13.295583 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:13.295583 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:13.303616 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:13.303616 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:13.303616 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:20 +403: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:20 +403: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:31:13.307176 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:13.309005 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:13.309005 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:13.331171 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770067873304
2026-02-02T15:31:13.331171 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:13.331171 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:13.332170 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:13.332170 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:13.360088 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:13.360088 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:13.369625 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:13.370629 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:13.370629 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:21 +404: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:21 +404: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:31:13.373630 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:13.375628 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:13.376131 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:13.409644 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770067873372
2026-02-02T15:31:13.410644 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:13.410644 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:13.410644 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:13.411643 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:13.416644 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:13.416644 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
00:21 +405: test\core\ipfs_test.dart: IPFS Facade should report stats
00:21 +405: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:31:13.430045 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:13.430045 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:13.431045 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:21 +406: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +406: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:31:13.438042 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:13.440042 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:13.440042 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:13.474342 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770067873435
2026-02-02T15:31:13.474342 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:13.475848 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:13.475848 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:13.475848 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:13.483852 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:13.484808 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:13.491997 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:13.491997 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:13.491997 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:21 +407: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +408: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +409: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +410: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +411: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +412: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +413: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +414: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +415: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +416: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +417: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +418: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +419: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +420: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:21 +421: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +422: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +423: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +424: test\core\ipld\ipld_extras_test.dart: IPLDSelector serialization round trip
00:22 +425: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:22 +426: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:22 +427: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:22 +428: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:22 +429: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +430: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +431: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +432: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +433: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +434: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +435: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +436: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +437: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +438: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +439: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +440: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +441: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +442: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +443: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +444: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +445: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +446: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +447: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +448: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +449: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +450: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +451: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:23 +452: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +453: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +454: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +455: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +456: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +457: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +458: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +459: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +460: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +461: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +462: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +463: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +464: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +465: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +466: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:24 +467: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:25 +468: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-CBOR data
00:25 +469: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-CBOR data
00:25 +470: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-CBOR data
00:25 +471: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-CBOR data
00:25 +472: test\core\ipld_handler_test.dart: IPLDHandler should put and get Raw data
00:25 +473: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-JSON data with links
DEBUG: Generated DAG-JSON: {"link":{"/":"bbkujcaa4qlddpfqgljewfgoykjuko656mb54kxtgo2uuh3bfbuiarz64b"}}
00:25 +474: test\core\ipld_handler_test.dart: IPLDHandler should resolve links
00:25 +475: test\core\ipld_handler_test.dart: IPLDHandler should throw error for unsupported codec
00:25 +475: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-CBOR data
2026-02-02T15:31:17.728008 [SEVERE] [IPLDHandler] [ERROR] Failed to put IPLD data
Error: Unsupported operation: Unsupported codec: unknown-codec
Stack trace: null
00:25 +476: test\core\ipld_schema_test.dart: IPLDSchema validates valid struct
00:25 +477: test\core\ipld_schema_test.dart: IPLDSchema validates struct missing required field
00:25 +478: test\core\ipld_schema_test.dart: IPLDSchema validates int constraint
00:25 +479: test\core\ipld_schema_test.dart: IPLDSchema validates string constraint (minLength)
00:25 +480: test\core\ipld_schema_test.dart: IPLDSchema throws on unknown type
00:25 +481: test\core\messages\message_factory_test.dart: MessageFactory createBaseMessage creates message with all fields
00:25 +482: test\core\messages\message_factory_test.dart: MessageFactory createBaseMessage sets timestamp
00:25 +483: test\core\messages\message_factory_test.dart: MessageFactory createBaseMessage handles empty payload
00:25 +484: test\core\messages\message_factory_test.dart: MessageFactory createBaseMessage handles different message types
00:25 +485: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:18.260469 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.280666 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:25 +486: test\core\metrics\metrics_collector_test.dart: MetricsCollector should respect enabled flag in config
00:25 +486: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:18.286827 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.288334 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.289838 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:18.289838 [INFO] [MetricsCollector] [INFO] Metrics collection disabled in config
2026-02-02T15:31:18.292898 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:18.294403 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:25 +487: test\core\metrics\metrics_collector_test.dart: MetricsCollector recordProtocolMetrics - message counts
00:25 +487: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:18.307066 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.317757 [FINE] [MetricsCollector] [VERBOSE] Recorded protocol metrics for bitswap
2026-02-02T15:31:18.317757 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:25 +488: test\core\metrics\metrics_collector_test.dart: MetricsCollector recordError tracking
00:25 +488: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:18.320831 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.322336 [FINE] [MetricsCollector] [VERBOSE] Recorded error for bitswap: timeout
2026-02-02T15:31:18.323371 [FINE] [MetricsCollector] [VERBOSE] Recorded error for bitswap: timeout
2026-02-02T15:31:18.323371 [FINE] [MetricsCollector] [VERBOSE] Recorded error for bitswap: invalid_msg
2026-02-02T15:31:18.324369 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:25 +489: test\core\metrics\metrics_collector_test.dart: MetricsCollector Connection metrics update and retrieval
00:26 +489: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:18.325874 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.332892 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:26 +490: test\core\metrics\metrics_collector_test.dart: MetricsCollector latency history management
00:26 +490: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:18.333897 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.338926 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:26 +491: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +491: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:18.341519 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.342040 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:18.343147 [INFO] [MetricsCollector] [INFO] Metrics collection started
00:26 +491: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:31:18.410905 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.422216 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:18.423567 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:18.426587 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:26 +492: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +492: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:31:18.430713 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.443065 [FINE] [MetricsCollector] [VERBOSE] Recorded protocol metrics for bitswap
00:26 +493: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +493: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:31:18.446348 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:26 +494: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +494: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:31:18.457177 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:26 +495: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +495: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:31:18.458691 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.463051 [FINE] [MetricsCollector] [VERBOSE] Recorded error for lookup: timeout
00:26 +496: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +496: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:31:18.464856 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.465444 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:18.465444 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:18.465444 [INFO] [MetricsCollector] [INFO] Metrics collection disabled in config
2026-02-02T15:31:18.466490 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:26 +497: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +498: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +499: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +500: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +501: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +502: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +503: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +504: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +505: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +506: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +507: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +508: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +509: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +510: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +511: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +512: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +513: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +514: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +515: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +516: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:26 +517: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:27 +517: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:19.355849 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:27 +518: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
00:27 +518: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:19.360915 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:19.361915 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:27 +519: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
00:27 +519: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:31:19.365441 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:19.367106 [FINE] [MetricsCollector] [VERBOSE] Recorded protocol metrics for invalid
2026-02-02T15:31:19.368124 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:27 +520: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
00:27 +521: test\core\security\security_manager_test.dart: SecurityManager secureKeystore getter
00:27 +522: test\core\security\security_manager_test.dart: SecurityManager should unlock keystore with password
00:27 +522: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:31:19.759511 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:27 +523: test\core\security\security_manager_test.dart: SecurityManager should unlock keystore with password
00:27 +523: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:31:19.785707 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:28 +523: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:20.784901 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
00:28 +524: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should unlock with password
00:29 +525: test\core\security\security_manager_test.dart: SecurityManager should lock keystore
00:29 +525: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:31:21.392034 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:29 +525: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:22.208021 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:22.209035 [INFO] [SecurityManager] [INFO] Encrypted keystore locked
00:29 +526: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should generate and retrieve secure keys
00:29 +527: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should generate and retrieve secure keys
00:29 +528: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should generate and retrieve secure keys
00:30 +529: test\core\security\security_manager_test.dart: SecurityManager should generate secure key when unlocked
00:30 +529: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:31:22.649381 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:30 +529: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:23.237417 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:23.342922 [INFO] [SecurityManager] [INFO] Generated secure key: test_key
00:31 +530: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should lock and clear keys
00:31 +531: test\core\security\security_manager_test.dart: SecurityManager getSecureKey - success
00:31 +532: test\core\security\security_manager_test.dart: SecurityManager getSecureKey - success
00:31 +533: test\core\security\security_manager_test.dart: SecurityManager getSecureKey - success
00:31 +534: test\core\security\security_manager_test.dart: SecurityManager getSecureKey - success
00:31 +535: test\core\security\security_manager_test.dart: SecurityManager getSecureKey - success
00:32 +535: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:24.573553 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:24.581156 [INFO] [SecurityManager] [INFO] Generated secure key: test_key
00:32 +536: test\core\storage\datastore_test.dart: Datastore Config MemoryDatastore put and get
00:32 +537: test\core\storage\datastore_test.dart: Datastore Config MemoryDatastore put and get
00:32 +537: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:24.605117 [INFO] [Keystore] [INFO] Added key pair for legacy_key.
00:32 +538: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +539: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +540: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +541: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +542: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +543: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +544: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +545: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +545 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:32 +545 -1: test\core\storage\datastore_test.dart: Datastore Config FlatFileDatastore query prefix [E]
  Expected: true
    Actual: <false>
  
  package:matcher                             expect
  test\core\storage\datastore_test.dart 77:7  verifyDatastore.<fn>.<fn>
  
00:32 +546 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +547 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +548 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +549 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +550 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +551 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +552 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +553 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +554 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +555 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +556 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +557 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +558 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +559 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:33 +559 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:25.776227 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:25.777744 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:31:25.784155 [INFO] [SecurityManager] [INFO] Migrating 1 keys to encrypted storage
2026-02-02T15:31:25.787663 [INFO] [Keystore] [INFO] Plaintext keystore cleared after migration
2026-02-02T15:31:25.788872 [INFO] [SecurityManager] [INFO] Successfully migrated 1 keys
00:33 +560 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:33 +561 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:33 +562 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:33 +563 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:34 +564 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:34 +565 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:34 +566 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:34 +567 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:35 +567 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:27.401029 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:27.401577 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:31:27.401577 [INFO] [SecurityManager] [INFO] No plaintext keys to migrate
00:35 +568 -1: test\core\unixfs\unixfs_test.dart: UnixFS File Sharding should shard large file into multiple blocks
DEBUG: Generated 6 blocks for 1150976 bytes
00:35 +569 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +570 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +571 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +572 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +573 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +574 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +575 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +576 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +577 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +578 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +579 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +580 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:35 +581 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:36 +581 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.328251 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:28.346221 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:28.346221 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:28.347726 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:28.348428 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:28.348428 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:31:28.349438 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:28.350943 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:28.352460 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:28.444393 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:28.444393 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:31:28.444393 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:31:28.446012 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:31:28.447030 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:31:28.449538 [FINE] [MDNSHandler] [DEBUG] MDNSHandler instance created
2026-02-02T15:31:28.501464 [FINE] [Libp2pRouter] [DEBUG] Registered protocol pubsub
2026-02-02T15:31:28.502535 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:31:28.502535 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:31:28.502535 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:31:28.502535 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:28.504040 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:31:28.504040 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:28.504040 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:31:28.504040 [FINE] [BootstrapHandler] [DEBUG] Creating new BootstrapHandler instance
2026-02-02T15:31:28.507483 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler instance created
2026-02-02T15:31:28.507997 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:31:28.510511 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
2026-02-02T15:31:28.511510 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:28.516149 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:28.517149 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:28.574300 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at C:\Users\Eduardo\AppData\Local\Temp\ipfs_e2e_test_5ef4dd20\datastore
2026-02-02T15:31:28.574300 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at C:\Users\Eduardo\AppData\Local\Temp\ipfs_e2e_test_5ef4dd20\datastore
2026-02-02T15:31:28.575298 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:28.575803 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:28.575803 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:28.577807 [FINE] [NetworkHandler] [DEBUG] Starting network services...
2026-02-02T15:31:28.578313 [FINE] [NetworkHandler] [VERBOSE] Initializing router...
2026-02-02T15:31:28.581222 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:28.590322 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:28.613737 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:28.669223 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:28.669223 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Initial _network.listenAddresses: []
2026-02-02T15:31:28.683495 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.687512 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:28.690026 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:28.690026 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.691535 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.692539 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:28.707146 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:28.717694 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:28.718694 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:28.718694 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:28.720199 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:28.720199 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:28.721203 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:28.721203 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:28.721203 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:28.722708 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:28.722708 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:28.727098 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:28.728102 [INFO] [Config] [Config.newNode] for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1: Host created. Listening will be handled by host.start().
2026-02-02T15:31:28.733543 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:28.734543 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, network.hashCode: 187816300, initial network.listenAddresses: []
2026-02-02T15:31:28.735047 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:28.735047 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:31:28.735047 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:28.736246 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.737251 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:28.737766 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.737766 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.737766 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
00:36 +581 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:28.740949 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:28.760459 [INFO] [SecurityManager] [INFO] Generated secure key: existing_key
2026-02-02T15:31:28.761461 [INFO] [Keystore] [INFO] Added key pair for existing_key.
2026-02-02T15:31:28.762459 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:31:28.763458 [INFO] [SecurityManager] [INFO] Migrating 1 keys to encrypted storage
00:36 +582 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.765468 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58515 for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.765468 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58515
2026-02-02T15:31:28.766489 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58515. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58515] for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.766489 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.767489 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58515 for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:28.769147 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.771152 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58515
2026-02-02T15:31:28.771152 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1.
2026-02-02T15:31:28.771152 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.772658 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.772658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.772658 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.773705 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.773705 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.773705 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:28.775211 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.776228 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
00:36 +583 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.783262 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.783262 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.783262 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.784767 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.785788 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.785788 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.785788 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.787787 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.787787 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.787787 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.788786 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
00:36 +583 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:28.789786 [SEVERE] [SecurityManager] [ERROR] Failed to initialize SecurityManager
Error: Bad state: TLS enabled but certificate or private key path not provided
Stack trace: #0      SecurityManager._initializeTLS (package:dart_ipfs/src/core/security/security_manager.dart:188:7)
#1      SecurityManager._initializeSecurity (package:dart_ipfs/src/core/security/security_manager.dart:169:9)
#2      new SecurityManager (package:dart_ipfs/src/core/security/security_manager.dart:26:5)
#3      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:187:20)
#4      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#5      _expect (package:matcher/src/expect/expect.dart:137:26)
#6      expect (package:matcher/src/expect/expect.dart:65:3)
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:187:7)
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:36 +584 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.841709 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:28.841709 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.841709 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 187816300, network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.854414 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.854414 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.855461 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.855461 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.855976 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.855976 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.855976 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.855976 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.856980 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.856980 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.856980 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.857484 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.857484 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.857484 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.857484 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.857484 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.858595 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:28.859620 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.859620 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.859620 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.859620 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.859620 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.859620 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.861125 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.861125 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.861125 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.861125 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.862169 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.862169 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.862169 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.863167 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.863167 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.863673 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.866206 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:28.866206 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:28.867369 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:28.868432 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.868432 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 187816300, network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.868432 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.868432 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 187816300, network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.869690 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.870714 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.870714 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.870714 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.870714 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.872218 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.872218 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.872218 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.872218 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.872218 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.872218 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.872218 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.872218 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.873258 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.873258 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.873258 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.873258 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.873258 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.874279 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.874279 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 187816300, network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.874279 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:28.875278 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.875278 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 187816300, network.listenAddresses: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.877473 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:28.877473 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:28.877473 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.879015 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:28.880757 [FINE] [NetworkHandler] [VERBOSE] Router started successfully
2026-02-02T15:31:28.880757 [FINE] [NetworkHandler] [VERBOSE] Initializing circuit relay client...
2026-02-02T15:31:28.882325 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:31:28.884410 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /libp2p/circuit/relay/0.2.0/hop
2026-02-02T15:31:28.884915 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /libp2p/circuit/relay/0.2.0/hop
2026-02-02T15:31:28.884915 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client started successfully
2026-02-02T15:31:28.884915 [FINE] [NetworkHandler] [VERBOSE] Registering AutoNAT dialback protocol handler
2026-02-02T15:31:28.884915 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/autonat/1.0.0/dialback
2026-02-02T15:31:28.884915 [FINE] [NetworkHandler] [DEBUG] AutoNAT dialback handler registered
2026-02-02T15:31:28.885988 [INFO] [NetworkHandler] [INFO] Network services started successfully
2026-02-02T15:31:28.885988 [FINE] [MDNSHandler] [DEBUG] MDNS disabled by configuration
2026-02-02T15:31:28.885988 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.885988 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.885988 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.885988 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.887493 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.887493 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.887493 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.887493 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.888511 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.888511 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.888511 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.888511 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.888511 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.888511 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.888511 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.890016 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.891032 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
2026-02-02T15:31:28.891032 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:28.892538 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:28.892538 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.892538 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.892538 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.893543 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.893543 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.893543 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.893543 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.894543 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.894543 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.894543 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.894543 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.894543 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.895542 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.895542 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.895542 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.895542 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.896543 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
00:36 +584 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:28.897542 [SEVERE] [SecurityManager] [ERROR] Failed to initialize SecurityManager
Error: FileSystemException: TLS certificate file not found, path = 'non_existent_cert'
Stack trace: #0      SecurityManager._initializeTLS (package:dart_ipfs/src/core/security/security_manager.dart:195:7)
#1      SecurityManager._initializeSecurity (package:dart_ipfs/src/core/security/security_manager.dart:169:9)
#2      new SecurityManager (package:dart_ipfs/src/core/security/security_manager.dart:26:5)
#3      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:197:15)
#4      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#5      _expect (package:matcher/src/expect/expect.dart:137:26)
#6      expect (package:matcher/src/expect/expect.dart:65:3)
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:196:7)
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:36 +585 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.902486 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:31:28.902486 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/kad/1.0.0
2026-02-02T15:31:28.902486 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:31:28.903991 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.903991 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.903991 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.905422 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.905928 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
00:36 +585 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:28.905928 [SEVERE] [SecurityManager] [ERROR] Failed to initialize SecurityManager
Error: FileSystemException: TLS private key file not found, path = 'non_existent_key'
Stack trace: #0      SecurityManager._initializeTLS (package:dart_ipfs/src/core/security/security_manager.dart:202:7)
#1      SecurityManager._initializeSecurity (package:dart_ipfs/src/core/security/security_manager.dart:169:9)
#2      new SecurityManager (package:dart_ipfs/src/core/security/security_manager.dart:26:5)
#3      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:214:17)
#4      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#5      _expect (package:matcher/src/expect/expect.dart:137:26)
#6      expect (package:matcher/src/expect/expect.dart:65:3)
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:213:9)
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:36 +585 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.905928 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.905928 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.905928 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.905928 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.907441 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.907441 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.907441 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.907441 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.908446 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
00:36 +586 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.908446 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.908953 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.909458 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:31:28.911331 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for pubsub
2026-02-02T15:31:28.912738 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.912738 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:28.914244 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:28.914244 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.914244 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.914244 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.915624 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.915624 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.915624 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.915624 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.915624 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.916654 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.916654 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.916654 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.916654 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.916654 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.917677 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.917677 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.917677 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.918771 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:31:28.918771 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
2026-02-02T15:31:28.918771 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:28.918771 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:31:28.918771 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:31:28.919771 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:31:28.919771 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:31:28.919771 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:31:28.919771 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:31:28.919771 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:31:28.921361 [FINE] [ContentRoutingHandler] [DEBUG] Starting ContentRoutingHandler...
2026-02-02T15:31:28.921361 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
2026-02-02T15:31:28.921361 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.921361 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.922363 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.922363 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.922363 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.922363 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.922363 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.922363 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.922363 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.923861 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.923861 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.923861 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.923861 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.923861 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.923861 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.923861 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.925366 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:31:28.925366 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=8
2026-02-02T15:31:28.925366 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:28.926877 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:31:28.928440 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/kad/1.0.0
2026-02-02T15:31:28.928440 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:28.929453 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.930452 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.930452 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.930452 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.930452 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.931453 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.931453 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.931453 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.931453 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.932451 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.932451 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.932451 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.932451 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.933452 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.934315 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.934315 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.934315 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:31:28.935321 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:31:28.936340 [INFO] [ContentRouting] [INFO] Content routing started.
2026-02-02T15:31:28.936340 [FINE] [ContentRoutingHandler] [VERBOSE] DHT-based content routing started
2026-02-02T15:31:28.936340 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler started successfully
2026-02-02T15:31:28.936340 [FINE] [DNSLinkHandler] [DEBUG] Starting DNSLinkHandler...
2026-02-02T15:31:28.936340 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler started successfully
2026-02-02T15:31:28.937833 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:28.937833 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:28.938340 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/graphsync/1.0.0
2026-02-02T15:31:28.938340 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/graphsync/1.0.0
2026-02-02T15:31:28.938340 [FINE] [GraphsyncHandler] [DEBUG] Starting GraphsyncHandler...
2026-02-02T15:31:28.938340 [FINE] [GraphsyncHandler] [DEBUG] GraphsyncHandler started successfully
2026-02-02T15:31:28.938340 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:28.939358 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1, Host hashCode: 776396808
2026-02-02T15:31:28.939358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.939358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.939358 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.939358 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.940359 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58515
2026-02-02T15:31:28.940359 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58515 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58515
2026-02-02T15:31:28.940359 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58515]
2026-02-02T15:31:28.940865 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58515 (first component not IP)
2026-02-02T15:31:28.940865 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:28.940865 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.940865 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.940865 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515}
2026-02-02T15:31:28.940865 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1 - Returning: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515]
2026-02-02T15:31:28.940865 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58515, /ip4/172.29.112.1/tcp/58515] for host 12D3KooWJpFTxNCzCRxTpCN64kf5N3v25fv3v1PxPmCmcgFmsyo1
2026-02-02T15:31:28.941869 [FINE] [AutoNATHandler] [DEBUG] Starting AutoNATHandler...
2026-02-02T15:31:28.941869 [FINE] [AutoNATHandler] [DEBUG] Detecting NAT type...
2026-02-02T15:31:28.944676 [FINE] [AutoNATHandler] [DEBUG] NAT type detected: NATType.restricted
2026-02-02T15:31:28.944676 [INFO] [AutoNATHandler] [INFO] NAT detected but port mapping is disabled in config
2026-02-02T15:31:28.945680 [FINE] [AutoNATHandler] [VERBOSE] Starting periodic dialback tests
2026-02-02T15:31:28.946680 [FINE] [AutoNATHandler] [VERBOSE] Performing dialback test
2026-02-02T15:31:28.946680 [FINE] [NetworkHandler] [VERBOSE] Starting dialback test
2026-02-02T15:31:28.946680 [FINE] [NetworkHandler] [DEBUG] No bootstrap peers available for dialback test
2026-02-02T15:31:28.948185 [FINE] [AutoNATHandler] [DEBUG] Dialback test complete. Reachable: false
2026-02-02T15:31:28.948185 [INFO] [AutoNATHandler] [INFO] AutoNATHandler started successfully
2026-02-02T15:31:28.949618 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:28.949618 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=5, addrs=2, protocols=9
2026-02-02T15:31:28.949618 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:28.949618 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:31:28.949618 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:28.949618 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:31:28.951295 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:28.951814 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/ipns-1.0.0
2026-02-02T15:31:28.951814 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:28.952887 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:36 +587 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.962122 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=6, addrs=2, protocols=10
2026-02-02T15:31:28.963122 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
00:36 +587 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:28.963628 [WARNING] [SecurityManager] [WARNING] Key not found in any keystore: non_existent
00:36 +588 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:31:28.970938 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:28.975999 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=7, addrs=2, protocols=11
2026-02-02T15:31:28.976503 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:28.976503 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:28.978013 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:28.978013 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:28.978013 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=8, addrs=2, protocols=12
2026-02-02T15:31:28.978013 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:28.979017 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:29.103948 [FINE] [Libp2pRouter] [DEBUG] Removed protocol handler for /ipfs/ipns-1.0.0
2026-02-02T15:31:29.103948 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
2026-02-02T15:31:29.103948 [FINE] [AutoNATHandler] [DEBUG] Stopping AutoNATHandler...
2026-02-02T15:31:29.105464 [INFO] [NatTraversalService] [INFO] Removing port mappings for port 4001...
2026-02-02T15:31:29.105967 [INFO] [AutoNATHandler] [INFO] AutoNATHandler stopped successfully
2026-02-02T15:31:29.105967 [FINE] [GraphsyncHandler] [DEBUG] Stopping GraphsyncHandler...
2026-02-02T15:31:29.105967 [FINE] [GraphsyncHandler] [DEBUG] GraphsyncHandler stopped successfully
2026-02-02T15:31:29.106971 [FINE] [DNSLinkHandler] [DEBUG] Stopping DNSLinkHandler...
2026-02-02T15:31:29.106971 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler stopped successfully
2026-02-02T15:31:29.106971 [FINE] [ContentRoutingHandler] [DEBUG] Stopping ContentRoutingHandler...
2026-02-02T15:31:29.107980 [INFO] [ContentRouting] [INFO] Content routing stopped.
2026-02-02T15:31:29.108491 [FINE] [ContentRoutingHandler] [VERBOSE] DHT-based content routing stopped
2026-02-02T15:31:29.108491 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler stopped successfully
2026-02-02T15:31:29.109507 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:29.113011 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:29.114029 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:29.114029 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:29.115029 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:29.116029 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:29.120037 [INFO] [PubSubClient] [INFO] PubSub client stopped.
2026-02-02T15:31:29.121069 [WARNING] [BootstrapHandler] [WARNING] BootstrapHandler already stopped
2026-02-02T15:31:29.123229 [WARNING] [MDNSHandler] [WARNING] MDNSHandler already stopped
2026-02-02T15:31:29.124334 [FINE] [NetworkHandler] [DEBUG] Stopping network services...
2026-02-02T15:31:29.125839 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:31:29.130528 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client stopped
2026-02-02T15:31:29.131601 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:31:29.132587 [FINE] [NetworkHandler] [VERBOSE] Router stopped
2026-02-02T15:31:29.133090 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:29.133090 [FINE] [NetworkHandler] [VERBOSE] Network event subscriptions canceled
2026-02-02T15:31:29.133090 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:29.133090 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:29.134104 [FINE] [NetworkHandler] [VERBOSE] Network event controller closed
2026-02-02T15:31:29.134104 [INFO] [NetworkHandler] [INFO] Network services stopped successfully
2026-02-02T15:31:29.134104 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:29.134104 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:29.135110 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:29.136695 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:29.483182 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:29.483182 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:29.483182 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
2026-02-02T15:31:29.501177 [SEVERE] [DatastoreHandler] [ERROR] Error loading pinned CIDs: Bad state: HiveDatastore not initialized. Call init() first.
2026-02-02T15:31:29.508894 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already stopped
2026-02-02T15:31:29.509894 [WARNING] [AutoNATHandler] [WARNING] AutoNATHandler already stopped
2026-02-02T15:31:29.510895 [FINE] [GraphsyncHandler] [DEBUG] Stopping GraphsyncHandler...
2026-02-02T15:31:29.510895 [FINE] [GraphsyncHandler] [DEBUG] GraphsyncHandler stopped successfully
2026-02-02T15:31:29.510895 [FINE] [DNSLinkHandler] [DEBUG] Stopping DNSLinkHandler...
2026-02-02T15:31:29.511894 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler stopped successfully
2026-02-02T15:31:29.511894 [FINE] [ContentRoutingHandler] [DEBUG] Stopping ContentRoutingHandler...
2026-02-02T15:31:29.511894 [INFO] [ContentRouting] [INFO] Content routing stopped.
2026-02-02T15:31:29.511894 [FINE] [ContentRoutingHandler] [VERBOSE] DHT-based content routing stopped
2026-02-02T15:31:29.511894 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler stopped successfully
2026-02-02T15:31:29.511894 [INFO] [PubSubClient] [INFO] PubSub client stopped.
2026-02-02T15:31:29.511894 [WARNING] [BootstrapHandler] [WARNING] BootstrapHandler already stopped
2026-02-02T15:31:29.513400 [WARNING] [MDNSHandler] [WARNING] MDNSHandler already stopped
2026-02-02T15:31:29.513400 [FINE] [NetworkHandler] [DEBUG] Stopping network services...
2026-02-02T15:31:29.514419 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:31:29.514419 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client stopped
2026-02-02T15:31:29.514419 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:31:29.514419 [FINE] [NetworkHandler] [VERBOSE] Router stopped
2026-02-02T15:31:29.514419 [FINE] [NetworkHandler] [VERBOSE] Network event subscriptions canceled
2026-02-02T15:31:29.514419 [FINE] [NetworkHandler] [VERBOSE] Network event controller closed
2026-02-02T15:31:29.515923 [INFO] [NetworkHandler] [INFO] Network services stopped successfully
2026-02-02T15:31:29.515923 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:29.515923 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:29.515923 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:29.516940 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:37 +589 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:37 +589 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:31:29.950731 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:29.969048 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:29.971065 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:30.018175 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:31:30.018681 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:30.018681 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:30.018681 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:30.021204 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:30.022711 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.custom
2026-02-02T15:31:30.150884 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:30.151388 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:30.166230 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:30.166230 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:30.167248 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:37 +590 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:37 +590 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:31:30.184945 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:30.184945 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:30.184945 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:30.210889 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:31:30.210889 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:30.211890 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:30.211890 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:30.212396 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:30.212396 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.internal
00:37 +590 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:30.288709 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:30.293239 [INFO] [SecurityManager] [INFO] Generated secure key: secure_key
00:38 +591 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +591 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:30.380179 [INFO] [Keystore] [INFO] Added key pair for legacy_key.
2026-02-02T15:31:30.381179 [WARNING] [SecurityManager] [WARNING] Retrieved PLAINTEXT key for legacy_key - migration recommended (SEC-008)
00:38 +592 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +592 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:31:31.332364 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:31:31.334909 [INFO] [SecurityManager] [INFO] Generated secure key: secure_key
2026-02-02T15:31:31.334909 [INFO] [SecurityManager] [INFO] Encrypted keystore locked
2026-02-02T15:31:31.336179 [WARNING] [SecurityManager] [WARNING] Encrypted key requested but keystore is locked: secure_key
00:39 +593 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +594 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +594 -1: test\integration\full_nat_test.dart: Full NAT Integration Test NetworkHandler.testDialback correctly extracts PeerID from Multiaddr (Fix Verification)
2026-02-02T15:31:31.651563 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:31:31.666886 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:31:31.667914 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:31:31.667914 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:31:31.668915 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:31:31.668915 [FINE] [NetworkHandler] [VERBOSE] Starting dialback test
2026-02-02T15:31:31.672424 [FINE] [NetworkHandler] [DEBUG] Dialback test completed successfully
00:39 +595 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +595 -1: test\integration\full_nat_test.dart: Full NAT Integration Test NetworkHandler.testDialback correctly extracts PeerID from Multiaddr (Fix Verification)
2026-02-02T15:31:31.683721 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
2026-02-02T15:31:31.684721 [FINE] [AutoNATHandler] [DEBUG] Starting AutoNATHandler...
2026-02-02T15:31:31.684721 [FINE] [AutoNATHandler] [DEBUG] Detecting NAT type...
2026-02-02T15:31:31.685225 [FINE] [AutoNATHandler] [DEBUG] NAT type detected: NATType.restricted
2026-02-02T15:31:31.686311 [FINE] [AutoNATHandler] [DEBUG] Attempting UPnP/NAT-PMP port mapping...
2026-02-02T15:31:31.686311 [FINE] [AutoNATHandler] [DEBUG] Identified listening port: 5001
2026-02-02T15:31:31.687815 [INFO] [AutoNATHandler] [INFO] Port mapping successful for protocols: TCP, UDP
2026-02-02T15:31:31.687815 [FINE] [AutoNATHandler] [VERBOSE] Performing dialback test
2026-02-02T15:31:31.688826 [FINE] [AutoNATHandler] [DEBUG] Dialback test complete. Reachable: false
2026-02-02T15:31:31.688826 [FINE] [AutoNATHandler] [VERBOSE] Starting periodic dialback tests
2026-02-02T15:31:31.689830 [INFO] [AutoNATHandler] [INFO] AutoNATHandler started successfully
2026-02-02T15:31:31.692403 [FINE] [AutoNATHandler] [DEBUG] Stopping AutoNATHandler...
2026-02-02T15:31:31.692403 [INFO] [AutoNATHandler] [INFO] AutoNATHandler stopped successfully
00:39 +596 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +597 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +598 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +599 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +600 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +601 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +602 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +603 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +604 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +605 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +606 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +607 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +608 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +609 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +610 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +611 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +612 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +613 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +614 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +615 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +616 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +617 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +618 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +619 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +620 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +621 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +622 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +623 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +624 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:40 +625 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +626 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +627 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +628 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +629 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +630 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +631 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +632 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +633 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +634 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +635 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +636 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +637 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +638 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +639 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:41 +640 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +641 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +641 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
2026-02-02T15:31:34.402985 [WARNING] [MDnsClient] [WARNING] MDnsClient already running
00:42 +642 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +642 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
2026-02-02T15:31:34.418724 [WARNING] [MDnsClient] [WARNING] MDnsClient already stopped
00:42 +643 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +644 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +645 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +646 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +646 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
2026-02-02T15:31:34.458607 [SEVERE] [MDnsClient] [ERROR] Error during mDNS lookup
Error: Exception: other
Stack trace: null
00:42 +647 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +648 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +649 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +650 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +651 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +652 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +653 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +654 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +655 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +656 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +657 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +658 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +659 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +660 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +661 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +662 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +663 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +664 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +665 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +666 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:42 +667 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +668 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +669 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +670 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +671 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +672 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +673 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +674 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +675 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +676 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +677 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +678 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +679 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +680 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +681 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +682 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +683 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +684 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +685 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +686 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +687 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +688 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +689 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +690 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +691 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +692 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +693 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:43 +693 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:31:35.952213 [WARNING] [HttpGatewayClient] [WARNING] Failed to retrieve CID test_cid from all gateways
2026-02-02T15:31:35.954070 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:35.954070 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:35.957650 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:35.957650 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:35.958761 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:43 +694 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +694 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:31:35.967216 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:35.968216 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:35.969215 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:31:35.985240 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:31:35.985240 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:35.986534 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:35.986534 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:35.986534 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:31:35.987541 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.public
00:43 +695 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +696 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +697 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +698 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +699 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +700 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +701 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:43 +702 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +702 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler start and stop
2026-02-02T15:31:36.330757 [INFO] [DelegateDHTHandler] [INFO] Starting DelegateDHTHandler with endpoint: http://REDACTED@localhost:5001
00:44 +703 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +704 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +705 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +706 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +707 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +708 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +708 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler start and stop
2026-02-02T15:31:36.415941 [SEVERE] [DelegateDHTHandler] [ERROR] Error querying delegate for providers
Error: Exception: net error
Stack trace: null
00:44 +709 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +710 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +710 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler start and stop
2026-02-02T15:31:36.438703 [WARNING] [DelegateDHTHandler] [WARNING] Delegate findProviders failed: 404
00:44 +711 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:44 +711 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:31:36.584047 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:36.584047 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:36.590550 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:36.591310 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:36.591310 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:44 +712 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +713 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +714 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +715 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +716 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +717 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +718 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +719 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:44 +720 -1: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Qm CID Extraction Pattern extracts first CID when multiple present
00:44 +721 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey handles raw string fallback
00:44 +722 -1: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Integration with Actual DHT Patterns validates typical CID formats work with alphanumeric pattern
00:44 +723 -1: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Integration with Actual DHT Patterns validates typical PeerID formats work with alphanumeric pattern
00:44 +724 -1: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Integration with Actual DHT Patterns rejects invalid CID/PeerID formats
00:44 +725 -2: loading test\protocols\dht\kademlia_routing_table_test.dart [E]
  Failed to load "test\protocols\dht\kademlia_routing_table_test.dart":
  test/protocols/dht/kademlia_routing_table_test.dart:148:38: Error: A value of type 'Timestamp/*1*/' can't be assigned to a variable of type 'Timestamp/*2*/'.
   - 'Timestamp/*1*/' is from 'package:dart_ipfs/src/proto/generated/google/protobuf/timestamp.pb.dart' ('lib/src/proto/generated/google/protobuf/timestamp.pb.dart').
   - 'Timestamp/*2*/' is from 'package:protobuf/well_known_types/google/protobuf/timestamp.pb.dart' ('../../AppData/Local/Pub/Cache/hosted/pub.dev/protobuf-6.0.0/lib/well_known_types/google/protobuf/timestamp.pb.dart').
          ..lastSeen = pb_ts.Timestamp.fromDateTime(DateTime.now());
                                       ^
  test/protocols/dht/kademlia_routing_table_test.dart:378:38: Error: A value of type 'Timestamp/*1*/' can't be assigned to a variable of type 'Timestamp/*2*/'.
   - 'Timestamp/*1*/' is from 'package:dart_ipfs/src/proto/generated/google/protobuf/timestamp.pb.dart' ('lib/src/proto/generated/google/protobuf/timestamp.pb.dart').
   - 'Timestamp/*2*/' is from 'package:protobuf/well_known_types/google/protobuf/timestamp.pb.dart' ('../../AppData/Local/Pub/Cache/hosted/pub.dev/protobuf-6.0.0/lib/well_known_types/google/protobuf/timestamp.pb.dart').
          ..lastSeen = pb_ts.Timestamp.fromDateTime(DateTime.now());
                                       ^
00:44 +725 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable initialize correctly sets up root node
00:44 +726 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable addPeer adds a new peer
00:44 +727 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable removePeer removes an existing peer
00:44 +728 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable bucket capacity limits (no split on fixed buckets)
00:44 +729 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable clear removes all peers
00:45 +730 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable IP diversity check limits peers per IP
00:45 +731 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers calculateDistance returns correct XOR distance
00:45 +732 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers getBucketIndex returns correct index
00:45 +733 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers findClosestNode finds the best node in subtree
00:45 +734 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers splitNode creates children correctly
00:45 +735 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers mergeNodes clears children
00:45 +736 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers findNode returns closer peers on success
00:45 +737 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers findNode returns empty list on failure
00:45 +738 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore store replicates and retrieves value
00:45 +739 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +740 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +741 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +742 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +743 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +744 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +745 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +746 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +747 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +748 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +749 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +750 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +751 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +752 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +753 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +754 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +755 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +756 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +757 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +758 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:45 +759 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore republishValues handles non-expired and expired items
00:46 +760 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore incrementReplicationCount and updateReplicationCount works
00:46 +761 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore replicateValue handles failure
00:46 +762 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.579359 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.598706 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.599788 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.600790 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
00:46 +763 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start is idempotent
00:46 +763 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.616109 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.617115 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.617115 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.618113 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.620114 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already running
00:46 +764 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle stop clears cache and unsubscribes
00:46 +764 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.625653 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.626659 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.626659 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.626659 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.627789 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:46 +765 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle stop is idempotent
00:46 +765 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.631376 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.632376 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already stopped
2026-02-02T15:31:38.632376 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already stopped
00:46 +766 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler getStatus returns running state
00:46 +766 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.637126 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.638632 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.638632 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.638632 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
00:46 +767 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler getStatus returns cache info
00:46 +767 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.642177 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
00:46 +768 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler resolve resolves IPNS name to CID
00:46 +768 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.646243 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.647756 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.648776 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.648776 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.650776 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: test-name
2026-02-02T15:31:38.683023 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: test-name
2026-02-02T15:31:38.684527 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: test-name to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
00:46 +769 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler resolve subscribes to topic when resolving with PubSub
00:46 +769 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.686045 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.688050 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.688050 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.688050 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.689068 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: 12D3KooWNxnY1oMhGCX
2026-02-02T15:31:38.694174 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: 12D3KooWNxnY1oMhGCX
2026-02-02T15:31:38.694174 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: 12D3KooWNxnY1oMhGCX to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
00:46 +770 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler publish validation publish throws for invalid CID format
00:46 +770 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.702776 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.703287 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.703801 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.703801 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.704999 [FINE] [IPNSHandler] [DEBUG] Publishing IPNS record for CID: invalid!cid with key: test
2026-02-02T15:31:38.706002 [SEVERE] [IPNSHandler] [ERROR] Failed to publish IPNS record
Error: Invalid argument(s): Invalid CID format
Stack trace: #0      IPNSHandler.publish (package:dart_ipfs/src/protocols/ipns/ipns_handler.dart:100:9)
#1      main.<anonymous closure>.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:165:25)
#2      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#3      _expect (package:matcher/src/expect/expect.dart:137:26)
#4      expect (package:matcher/src/expect/expect.dart:65:3)
#5      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:164:9)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:46 +771 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler publish validation publish throws when keystore is locked
00:46 +771 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.713133 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.713133 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.714715 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.714715 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.715736 [FINE] [IPNSHandler] [DEBUG] Publishing IPNS record for CID: QmTestCID123 with key: mykey
2026-02-02T15:31:38.715736 [SEVERE] [IPNSHandler] [ERROR] Failed to publish IPNS record
Error: Bad state: Keystore is locked. Call securityManager.unlockKeystore() first.
Stack trace: #0      IPNSHandler.publish (package:dart_ipfs/src/protocols/ipns/ipns_handler.dart:105:9)
#1      main.<anonymous closure>.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:174:25)
#2      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#3      _expect (package:matcher/src/expect/expect.dart:137:26)
#4      expect (package:matcher/src/expect/expect.dart:65:3)
#5      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:173:9)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:46 +772 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler without PubSub handler works without PubSub
00:46 +772 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.719242 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.719242 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.720242 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.720242 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.720752 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:46 +773 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler without PubSub resolve works without PubSub
00:46 +773 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.722776 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.723282 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.723282 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.723282 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.724285 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: test-name
2026-02-02T15:31:38.724285 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: test-name
2026-02-02T15:31:38.724285 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: test-name to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
2026-02-02T15:31:38.724285 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:46 +774 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler createRecord (deprecated) creates an unsigned Record
00:46 +774 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.726794 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.734963 [WARNING] [IPNSHandler] [WARNING] Using unsigned Record - migrate to IPNSRecord.create()
00:46 +775 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler publishRecord validation throws StateError on unsigned record
00:46 +775 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.737531 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
00:46 +776 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord (setUpAll)
00:46 +776 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:31:38.785063 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:38.785573 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:38.785573 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:38.785573 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:31:38.785573 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: cached-name
2026-02-02T15:31:38.786577 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: cached-name
2026-02-02T15:31:38.787576 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: cached-name to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
2026-02-02T15:31:38.787576 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: cached-name
2026-02-02T15:31:38.787576 [FINE] [IPNSHandler] [VERBOSE] Returning cached resolution for: cached-name
2026-02-02T15:31:38.788576 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:46 +777 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord (setUpAll)
00:46 +777 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord create generates a signed record
00:46 +778 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord verify returns true for valid signed record
00:46 +779 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord verify returns false for expired record
00:46 +780 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord toCBOR serializes correctly
00:46 +781 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord fromCBOR deserializes correctly
00:46 +782 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord roundtrip preserves data and signature validity
00:46 +783 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord valueCID parses CID from value
00:46 +784 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord toString provides readable output
00:46 +785 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord sequence numbers can be incremented
00:46 +786 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord different key pairs produce different signatures
00:46 +787 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord fromCBOR throws on invalid data
00:46 +788 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord (tearDownAll)
00:46 +788 -2: test\protocols\ipns\ipns_pubsub_test.dart: IPNS over PubSub start() subscribes to PubSub topic
2026-02-02T15:31:39.310152 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:39.333549 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:31:39.337070 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:31:39.340090 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
00:47 +789 -2: test\protocols\ipns\ipns_pubsub_test.dart: IPNS over PubSub publish() broadcasts record via PubSub
00:47 +789 -2: test\protocols\ipns\ipns_pubsub_test.dart: IPNS over PubSub start() subscribes to PubSub topic
2026-02-02T15:31:39.363398 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:31:39.461690 [FINE] [IPNSHandler] [DEBUG] Publishing IPNS record for CID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn with key: self
2026-02-02T15:31:39.525092 [FINE] [IPNSHandler] [VERBOSE] Published IPNS record to topics: /ipfs/ipns-1.0.0, /record/ACAYP_tpySbXGXEAxf9Ul21YTaUsf4SYfggRIFRE53-blQ
2026-02-02T15:31:39.525612 [INFO] [IPNSHandler] [INFO] Successfully published signed IPNS record for CID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
00:47 +790 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:47 +791 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create sets default validity and ttl
00:47 +792 -2: test\protocols\protocol_coordinator_test.dart: ProtocolCoordinator Status Structure status contains expected keys
00:47 +793 -2: test\protocols\protocol_coordinator_test.dart: ProtocolCoordinator Status Structure status contains expected keys
00:47 +794 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:47 +795 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:47 +796 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:47 +797 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:47 +798 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:47 +799 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:47 +800 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:47 +801 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify fails for tampered value
00:47 +802 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify fails for expired record
00:47 +803 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord toCBOR/fromCBOR serializes and deserializes correctly
00:47 +804 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord toCBOR/fromCBOR preserves signature through round-trip
00:47 +805 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord valueCID parses value as CID
00:47 +806 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord sign can re-sign record with different key
00:47 +807 -2: loading test\protocol_test.dart
🧪 IPFS Protocol Compliance Test

Testing: CID, Kademlia DHT, Bitswap, UnixFS, DAG-PB
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Test 1: CID v0...
  ✅ CID v0 PASS

Test 2: CID v1...
  ✅ CID v1 PASS

Test 3: Kademlia DHT message...
  ✅ Kademlia PASS

Test 4: Bitswap 1.2.0 message...
  ✅ Bitswap PASS

Test 5: UnixFS data structure...
  ✅ UnixFS PASS

Test 6: DAG-PB (MerkleDAG)...
  ✅ DAG-PB PASS

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Results: 6 passed, 0 failed

🎉 ALL TESTS PASSED!
✅ IPFS Protocol Standardization Verified!

00:47 +807 -2: test\routing\content_routing_test.dart: ContentRouting Provider Conversion empty providers list returns empty
00:47 +808 -2: test\routing\content_routing_test.dart: ContentRouting Provider Conversion providers are converted to strings
00:47 +809 -2: test\routing\content_routing_test.dart: ContentRouting DNSLink Integration successful resolution returns CID
00:47 +810 -2: test\routing\content_routing_test.dart: ContentRouting DNSLink Integration failed resolution returns null
00:47 +811 -2: test\routing\content_routing_test.dart: ContentRouting Lifecycle start initializes and starts DHT client
00:47 +812 -2: test\routing\content_routing_test.dart: ContentRouting Lifecycle stop stops DHT client
00:48 +813 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
2026-02-02T15:31:40.724241 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:40.751359 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:31:40.752444 [INFO] [MetricsCollector] [INFO] Metrics collection started
00:48 +814 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:48 +815 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:48 +816 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:48 +817 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
2026-02-02T15:31:40.806150 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:31:40.807155 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:31:40.807661 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:31:40.807661 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:31:40.808732 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:48 +818 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:48 +819 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
Put block with Key: bbkujcbpcwqev4ve4wsqayadcy46xdq3un53jfjy5zxjbjhacngcuddlzx
2026-02-02T15:31:40.915522 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:31:40.916520 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:31:40.926715 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:31:40.928086 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:31:40.929233 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:48 +820 -2: test\services\gateway\adaptive_compression_handler_test.dart: AdaptiveCompressionHandler getOptimalCompression selects correct type
00:48 +821 -2: test\services\gateway\adaptive_compression_handler_test.dart: AdaptiveCompressionHandler compressBlock returns original if disabled
00:48 +822 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore storeCompressedData stores data and metadata
00:49 +823 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore storeCompressedData stores data and metadata
00:49 +824 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore storeCompressedData stores data and metadata
00:49 +825 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore getCompressedData retrieves and decompresses data
00:49 +826 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore getCompressedData returns null for missing file
00:49 +827 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore initialization creates directory if missing
00:49 +828 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType detects known signatures
00:49 +829 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType falls back to octet-stream
00:49 +830 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType detects text
00:49 +831 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType favors filename
00:49 +832 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Processing processContent renders markdown
00:49 +833 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Processing processContent renders markdown
00:49 +834 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Processing processContent renders markdown
00:49 +835 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Processing processContent renders markdown
00:49 +836 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Processing processContent renders markdown
00:49 +837 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateTextPreview formats Markdown correctly
00:49 +838 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateTextPreview formats Markdown correctly
00:49 +839 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateTextPreview formats Markdown correctly
00:50 +840 -2: test\services\gateway\gateway_helpers_test.dart: GatewayLruCache capacity check
00:50 +841 -2: test\services\gateway\gateway_helpers_test.dart: GatewayLruCache put/get/eviction
00:50 +842 -2: test\services\gateway\gateway_helpers_test.dart: GatewayLruCache clear
00:50 +843 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler detectContentType from filename
00:50 +844 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler detectContentType from content
00:50 +845 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler processContent markdown
00:50 +846 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler processContent markdown
00:50 +846 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.535480 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.549742 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +847 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler processContent markdown
00:50 +848 -2: test\services\gateway\gateway_server_test.dart: GatewayServer cannot start twice
00:50 +848 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.554332 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.559302 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +849 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:50 +849 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.572036 [SEVERE] [GatewayServer] [ERROR] Failed to start gateway server
Error: Exception: Serve failed
Stack trace: #0      MockHttpServerAdapter.serve (file:///C:/Users/Eduardo/Documents/ipfs/test/services/gateway/gateway_server_test.dart:43:21)
#1      GatewayServer.start (package:dart_ipfs/src/services/gateway/gateway_server.dart:114:35)
#2      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/services/gateway/gateway_server_test.dart:125:27)
#3      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#4      _expect (package:matcher/src/expect/expect.dart:137:26)
#5      expect (package:matcher/src/expect/expect.dart:65:3)
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/services/gateway/gateway_server_test.dart:125:7)
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:50 +850 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:50 +850 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.575474 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.597438 [INFO] [GatewayServer] [INFO] [GET] health - 200 (5ms)
2026-02-02T15:31:42.611070 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +851 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:50 +852 -2: test\services\gateway\gateway_server_test.dart: GatewayServer routing - version endpoint
00:50 +852 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.617620 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.618620 [INFO] [GatewayServer] [INFO] [GET] api/v0/version - 200 (1ms)
2026-02-02T15:31:42.624148 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +853 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser generateHtmlListing
00:50 +853 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.634429 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
00:50 +854 -2: test\services\gateway\gateway_server_test.dart: GatewayServer CORS middleware - OPTIONS request
00:50 +854 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.638442 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +855 -2: loading test\services\gateway\gateway_services_test.dart
00:50 +855 -2: test\services\gateway\gateway_server_test.dart: GatewayServer CORS middleware - regular request headers
00:50 +855 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.643664 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.645056 [INFO] [GatewayServer] [INFO] [GET] health - 200 (1ms)
2026-02-02T15:31:42.646062 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +856 -2: test\services\gateway\gateway_server_test.dart: GatewayServer Rate limiting middleware
00:50 +856 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.656095 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.658096 [INFO] [GatewayServer] [INFO] [GET] health - 200 (1ms)
2026-02-02T15:31:42.659095 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:31:42.661093 [WARNING] [GatewayServer] [WARNING] Rate limit exceeded for 1.2.3.4
2026-02-02T15:31:42.664873 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:31:42.667877 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +857 -2: test\services\gateway\gateway_server_test.dart: GatewayServer HEAD request returns headers only
00:50 +857 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.672739 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.696215 [INFO] [GatewayServer] [INFO] [HEAD] ipfs/QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn - 404 (22ms)
2026-02-02T15:31:42.699813 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +858 -2: test\services\gateway\gateway_server_test.dart: GatewayServer Rate limiting middleware with X-Forwarded-For
00:50 +858 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.703045 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.704555 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:31:42.704555 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +859 -2: test\services\gateway\gateway_server_test.dart: GatewayServer routing - ipns support
00:50 +859 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.706072 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.707586 [INFO] [GatewayServer] [INFO] [GET] ipns/test.eth - 404 (0ms)
00:50 +860 -2: test\services\gateway\gateway_server_test.dart: GatewayServer Logging middleware executes
00:50 +860 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:31:42.709698 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:31:42.710697 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:31:42.711699 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:50 +861 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:50 +862 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:50 +863 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:50 +864 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:50 +865 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:50 +866 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should return 404 for missing block
00:50 +867 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should handle range request
00:50 +868 -2: test\services\gateway\gateway_services_test.dart: PersistentPreviewCache should cache and retrieve preview
00:51 +869 -2: test\services\gateway\gateway_services_test.dart: PersistentPreviewCache should evict old entries when cache is full
00:51 +870 -2: test\services\gateway\gateway_services_test.dart: CachedPreviewGenerator should generate and cache new preview
00:51 +871 -2: test\services\gateway\gateway_services_test.dart: CachedPreviewGenerator should return cached preview if available
00:51 +872 -2: test\services\gateway_test.dart: GatewayHandler handlePath returns 404 for missing block
00:51 +873 -2: test\services\gateway_test.dart: GatewayHandler handlePath serves raw block if not UnixFS
00:51 +874 -2: test\services\gateway_test.dart: GatewayHandler handlePath serves UnixFS File
00:51 +875 -2: test\services\gateway_test.dart: GatewayHandler handlePath serves range request
00:51 +876 -2: test\services\gateway_test.dart: GatewayHandler handlePath renders Directory
00:51 +877 -2: test\services\gateway_test.dart: GatewayHandler handlePath navigates directory to subpath
00:51 +878 -2: test\services\gateway_test.dart: GatewayHandler handlePath resolves IPNS name
00:51 +879 -2: test\services\gateway_test.dart: GatewayHandler handlePath returns 404 for unknown IPNS name
00:51 +879 -2: test\services\gateway_test.dart: GatewayHandler handlePath returns 404 for missing block
2026-02-02T15:31:43.883461 [WARNING] [GatewayHandler] [WARNING] Failed to resolve IPNS name unknown: Exception: Failed
00:51 +880 -3: loading test\services\general_services_test.dart [E]
  Failed to load "test\services\general_services_test.dart":
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/protobuf/any.pb.dart:147:50: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Any> createRepeated() => $pb.PbList<Any>();
                                                   ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:73:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<RetryInfo> createRepeated() => $pb.PbList<RetryInfo>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:134:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<DebugInfo> createRepeated() => $pb.PbList<DebugInfo>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:201:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<QuotaFailure_Violation>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:288:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<QuotaFailure>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:371:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<ErrorInfo> createRepeated() => $pb.PbList<ErrorInfo>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:467:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<PreconditionFailure_Violation>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:557:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<PreconditionFailure>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:613:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<BadRequest_FieldViolation>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:684:57: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<BadRequest> createRepeated() => $pb.PbList<BadRequest>();
                                                          ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:739:58: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<RequestInfo> createRepeated() => $pb.PbList<RequestInfo>();
                                                           ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:818:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<ResourceInfo>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:915:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Help_Link> createRepeated() => $pb.PbList<Help_Link>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:986:51: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Help> createRepeated() => $pb.PbList<Help>();
                                                    ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:1042:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<LocalizedMessage>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/protobuf/duration.pb.dart:123:55: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Duration> createRepeated() => $pb.PbList<Duration>();
                                                        ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/status.pb.dart:73:53: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Status> createRepeated() => $pb.PbList<Status>();
                                                      ^^^^^^
00:52 +880 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:31:44.452252 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:44.479426 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:31:44.510029 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
00:52 +881 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +882 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +883 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +884 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +885 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +886 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +887 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +888 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:52 +889 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:31:44.718820 [INFO] [RPCServer] [INFO] RPC server stopped
00:52 +890 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return node ID
00:52 +890 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:31:44.722907 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:44.724152 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:31:44.725657 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:31:44.766902 [INFO] [RPCServer] [INFO] RPC server stopped
00:52 +891 -3: test\services\rpc\rpc_server_test.dart: RPCServer should require API key for protected endpoints
00:52 +891 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:31:44.773903 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:44.775409 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:31:44.780415 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:31:44.803278 [WARNING] [RPCServer] [WARNING] Unauthorized RPC request to /api/v0/swarm/peers from unknown
2026-02-02T15:31:44.811088 [INFO] [RPCServer] [INFO] RPC server stopped
00:52 +892 -3: test\services\rpc\rpc_server_test.dart: RPCServer should allow protected endpoints with valid API key
00:52 +892 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:31:44.823807 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:44.823807 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:31:44.826316 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:31:44.859231 [INFO] [RPCServer] [INFO] RPC server stopped
00:52 +893 -3: test\services\rpc\rpc_server_test.dart: RPCServer should reject invalid API key
00:52 +893 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:31:44.861679 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:31:44.861679 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:31:44.864695 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:31:44.891610 [WARNING] [RPCServer] [WARNING] Unauthorized RPC request to /api/v0/swarm/peers from unknown
2026-02-02T15:31:44.896060 [INFO] [RPCServer] [INFO] RPC server stopped
00:52 +894 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns data when gateway succeeds
2026-02-02T15:31:45.097472 [INFO] [HttpGatewayClient] [INFO] Successfully retrieved CID QmHash from https://ipfs.io/ipfs/
00:52 +895 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns null when all gateways fail
00:52 +895 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns data when gateway succeeds
2026-02-02T15:31:45.123584 [WARNING] [HttpGatewayClient] [WARNING] Failed to retrieve CID QmHash from all gateways
00:52 +896 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get uses specific baseUrl if provided
00:52 +897 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get handles fallback correctly
00:52 +897 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns data when gateway succeeds
2026-02-02T15:31:45.135232 [INFO] [HttpGatewayClient] [INFO] Successfully retrieved CID QmHash from https://dweb.link/ipfs/
00:52 +898 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient isReachable returns true on success
00:52 +899 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient isReachable returns false on failure
00:52 +900 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.284753 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:45.297087 [FINE] [Libp2pRouter] [DEBUG] Deriving Ed25519 identity from seed
2026-02-02T15:31:45.408752 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
00:53 +901 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should not re-initialize
00:53 +901 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.467494 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:45.468494 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:45.475506 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:45.477449 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage start should handle empty listen addresses
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.491182 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:45.491182 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:45.497989 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:45.497989 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:45.506854 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:45.523596 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.540853 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:45.560532 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.580722 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:45.582290 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - Initial _network.listenAddresses: []
2026-02-02T15:31:45.597424 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf, Host hashCode: 568791757
2026-02-02T15:31:45.599427 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:45.602427 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:45.603426 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.603426 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.604427 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:45.615089 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:45.653394 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:45.653394 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:45.654394 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:45.654394 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:45.655393 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:45.655393 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:45.655393 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:45.655393 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:45.656393 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:45.656393 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:45.662628 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:45.663628 [INFO] [Config] [Config.newNode] for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf: Host created. Listening will be handled by host.start().
2026-02-02T15:31:45.670897 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:45.670897 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf, network.hashCode: 697999227, initial network.listenAddresses: []
2026-02-02T15:31:45.671897 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.671897 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4001]. Attempting to listen via _network.listen().
2026-02-02T15:31:45.671897 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.673897 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4001] for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.674898 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.675896 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.677405 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4001 with transport TCPTransport for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.677405 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4001 with transport TCPTransport
2026-02-02T15:31:45.702571 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4001. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.702571 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4001 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4001
2026-02-02T15:31:45.703575 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4001. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4001] for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.703575 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.707573 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:45.708573 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.710573 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4001
2026-02-02T15:31:45.710573 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf.
2026-02-02T15:31:45.711573 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.711573 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.711573 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.711573 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.712573 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.712573 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.712573 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:45.713573 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.714292 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.721417 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.721417 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.722923 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:31:45.722923 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:31:45.723927 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.723927 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.723927 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.725432 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.725432 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.725432 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.726454 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.726454 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:45.726960 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:45.727465 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:45.734817 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:45.738797 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:45.745905 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.774425 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:45.774425 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.775424 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 697999227, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.787860 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:45.787860 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf, Host hashCode: 568791757
2026-02-02T15:31:45.787860 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.788883 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.788883 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.788883 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.788883 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:31:45.789885 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:31:45.789885 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.790390 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.790390 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.790894 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.790894 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.790894 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.791899 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
2026-02-02T15:31:45.791899 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.792404 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:45.793418 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:45.793418 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf, Host hashCode: 568791757
2026-02-02T15:31:45.793418 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.794644 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.794644 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.794644 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.794644 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:31:45.795658 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:31:45.795658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.796164 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.796164 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.796164 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.797168 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.797168 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.797168 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
2026-02-02T15:31:45.798169 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.798674 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:45.800677 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:45.801688 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:45.802694 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.802694 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 697999227, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.802694 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.803693 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 697999227, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.805138 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.805652 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.807708 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:45.807708 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf, Host hashCode: 568791757
2026-02-02T15:31:45.808220 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.808220 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.808220 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.808220 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.809235 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:31:45.809235 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:31:45.809235 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.810234 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:31:45.810234 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:45.810234 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.810234 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.810234 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:31:45.811496 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
2026-02-02T15:31:45.811496 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001] for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.811496 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.813001 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.813001 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 697999227, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.813001 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:45.814645 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.814645 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 697999227, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:45.815825 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:45.815825 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:45.816836 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4001 with ID: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:45.817839 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:45.823917 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:45.835277 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:45.835277 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:45.842958 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:45.843647 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:45.845743 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:45.845743 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:45.848264 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:45.848264 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:45.851812 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:45.853322 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:45.853322 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.867947 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:45.867947 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - Initial _network.listenAddresses: []
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.883062 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.887925 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN, Host hashCode: 1037802963
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.887925 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.890433 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:45.894871 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.894871 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.895871 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 57ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.896375 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.896375 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 63ms (dial: 58ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:45.897379 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.897379 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.897379 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.898378 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.898378 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.899378 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:45.899378 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:45.899378 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:45.900378 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:45.900378 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:45.901377 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:45.903377 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:45.903377 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.904377 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.904377 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 4ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:45.904377 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 5ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:45.905376 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:45.905376 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.905376 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:45.907375 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:45.907375 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.909374 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.915372 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:45.915372 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:45.916372 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:45.917372 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:45.919372 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:45.920376 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.924006 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.936048 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 28ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:45.936048 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 28ms (dial: 28ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:45.937049 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:45.937049 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.937049 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:45.938048 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:45.938048 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:45.939350 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:45.939350 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:45.939894 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:45.939894 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.944504 [FINE] [basichost] Discovered 2 network interfaces
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.944504 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:45.946063 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.946063 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.946063 [FINER] [basichost] Processing interface: Wi-Fi
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.946063 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 8ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:45.946063 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 8ms (dial: 8ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:58:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.947582 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.947582 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:45.947582 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:45.947582 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.947582 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:45.949091 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:45.949091 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:45.949596 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:45.949596 [FINE] [basichost] Interface discovery completed. Found 2 addresses
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.949596 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:45.949596 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:45.951436 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.952984 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:45.952984 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
00:53 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.953989 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:45.955441 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:53 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.959432 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
00:53 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.960634 [INFO] [Config] [Config.newNode] for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN: Host created. Listening will be handled by host.start().
00:53 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.968183 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:45.969183 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:45.969183 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:45.969183 [FINE] [identify] IdentifyService.close: Identify service closed.
00:53 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.969183 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:45.970184 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN, network.hashCode: 39646838, initial network.listenAddresses: []
2026-02-02T15:31:45.970184 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:45.970184 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4101]. Attempting to listen via _network.listen().
2026-02-02T15:31:45.971183 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4101]
00:53 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:45.972184 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
00:53 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:45.973184 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:45.973184 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:45.974182 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:45.976691 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4101 with transport TCPTransport for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:45.976691 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4101 with transport TCPTransport
00:53 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.024258 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:46.025259 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:46.029770 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:46.029770 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:46.032367 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.034457 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.036492 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.036492 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz - Initial _network.listenAddresses: []
00:53 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.036492 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4101. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.036492 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4101 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4101
2026-02-02T15:31:46.037998 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4101. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.037998 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4101]
00:53 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.037998 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz, Host hashCode: 706917165
2026-02-02T15:31:46.037998 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.039003 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.039003 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.039003 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.039003 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
00:53 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.040003 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN. This should be resolved to concrete addresses by the host.
00:53 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.040003 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:53 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.041002 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.043190 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4101
2026-02-02T15:31:46.044194 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN.
2026-02-02T15:31:46.044194 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.044698 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.044698 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.044698 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.044698 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.045702 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.045702 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:46.046716 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.046716 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.051331 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.051331 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.052846 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
2026-02-02T15:31:46.052846 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
2026-02-02T15:31:46.054357 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.054357 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.054357 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.054357 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.055401 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.055401 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.055915 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
2026-02-02T15:31:46.091864 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:46.092371 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.092371 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 39646838, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.101645 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.102149 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN, Host hashCode: 1037802963
2026-02-02T15:31:46.102149 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.102149 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.102149 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.103152 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.103152 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
2026-02-02T15:31:46.103152 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
2026-02-02T15:31:46.103152 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.104152 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.104152 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.104152 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.104656 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.104656 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.105160 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
2026-02-02T15:31:46.105695 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.106202 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:46.107205 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.107205 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN, Host hashCode: 1037802963
2026-02-02T15:31:46.107205 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.107205 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.108611 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.108611 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.108611 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
2026-02-02T15:31:46.109928 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
2026-02-02T15:31:46.109928 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.109928 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.109928 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.109928 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.111148 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.111148 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.111148 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
2026-02-02T15:31:46.112156 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.113662 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:46.114665 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:46.115669 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:46.115669 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.115669 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 39646838, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.115669 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.115669 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 39646838, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.117117 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.119335 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.119335 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN, Host hashCode: 1037802963
2026-02-02T15:31:46.120335 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.120335 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.120335 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.120335 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.120335 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
2026-02-02T15:31:46.121410 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
2026-02-02T15:31:46.121410 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.121410 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:31:46.121410 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.121410 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.122407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.122407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:31:46.122912 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
2026-02-02T15:31:46.122912 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101] for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.122912 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.123915 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.123915 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 39646838, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.123915 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:46.123915 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.123915 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 39646838, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.126462 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:46.126462 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:46.126462 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4101 with ID: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
2026-02-02T15:31:46.127972 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:46.130581 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.136808 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:46.137815 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:46.141840 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:46.141840 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.142882 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.142882 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:46.142882 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:46.144386 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:46.146451 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.147455 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.147455 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.154471 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.155016 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.158543 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.159543 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 20ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.159543 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 22ms (dial: 21ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.159543 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.160545 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.160545 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:46.160545 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:46.160545 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.162049 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.162049 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:46.162049 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.162049 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.162049 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.162049 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.163556 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.163556 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.163556 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 3ms (dial: 3ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.163556 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.164562 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.164562 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:46.164562 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:46.164562 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.165630 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.165630 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:46.165630 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.165630 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.165630 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.165630 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.165630 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.166895 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.166895 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.166895 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.167995 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.167995 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:46.168609 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:46.168609 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.168609 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.168609 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:46.169620 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.169620 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.169620 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.169620 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.169620 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.170646 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.170646 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.170646 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.170646 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.173177 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:46.174193 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:46.174193 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:46.175193 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:46.176205 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:46.176205 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:53 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage start should handle invalid port in listen addresses
00:53 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.199134 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:46.199134 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:46.199134 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:46.200643 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:46.202152 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:46.206156 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:46.207159 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:46.210630 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:46.211655 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:46.211655 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:46.215450 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:46.215450 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:46.216556 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.217577 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.218911 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.220062 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA - Initial _network.listenAddresses: []
2026-02-02T15:31:46.220062 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, Host hashCode: 1001852740
2026-02-02T15:31:46.220062 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.221061 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.221061 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.221061 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.221061 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:46.222063 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:54 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.430036 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:46.430036 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:46.430036 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:46.430036 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:46.430036 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:46.431037 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:46.431037 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:46.431037 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:46.431037 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:46.431037 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:46.432038 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:46.432038 [INFO] [Config] [Config.newNode] for peer 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz: Host created. Listening will be handled by host.start().
2026-02-02T15:31:46.432038 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.432038 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz, network.hashCode: 196293710, initial network.listenAddresses: []
2026-02-02T15:31:46.432038 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:46.433036 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4001]. Attempting to listen via _network.listen().
2026-02-02T15:31:46.433036 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:46.433538 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4001] for peer 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.433538 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:31:46.434044 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.434044 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4001 with transport TCPTransport for peer 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.434044 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4001 with transport TCPTransport
00:54 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.470690 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:46.470690 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:46.472194 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:46.472194 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:46.472194 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:46.472194 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:46.472194 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:46.473277 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:46.473277 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:46.473277 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:46.473277 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:46.473277 [INFO] [Config] [Config.newNode] for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA: Host created. Listening will be handled by host.start().
2026-02-02T15:31:46.474374 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.474374 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, network.hashCode: 30442716, initial network.listenAddresses: []
2026-02-02T15:31:46.474374 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.474374 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4101]. Attempting to listen via _network.listen().
2026-02-02T15:31:46.475373 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.475877 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.476896 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:46.476896 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.476896 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4101 with transport TCPTransport for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.478894 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4101 with transport TCPTransport
00:54 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.511627 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4001: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4001 for peer 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.513132 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4001 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4001
2026-02-02T15:31:46.513132 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz.
2026-02-02T15:31:46.514151 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.514151 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:31:46.514151 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.514151 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:46.514151 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.514151 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:46.514151 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:46.514151 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.514151 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.514151 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.515626 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
2026-02-02T15:31:46.522681 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:46.522681 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.522681 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 196293710, network.listenAddresses: []
2026-02-02T15:31:46.524291 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.524291 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz, Host hashCode: 706917165
2026-02-02T15:31:46.524291 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.525293 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.525293 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.525293 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.525293 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:46.525293 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.525293 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz, Host hashCode: 706917165
2026-02-02T15:31:46.525293 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.526424 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.526424 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.526424 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.527427 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:46.527427 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:46.527427 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:46.527427 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.527427 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 196293710, network.listenAddresses: []
2026-02-02T15:31:46.527427 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.527427 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 196293710, network.listenAddresses: []
2026-02-02T15:31:46.527427 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.528770 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.528770 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz, Host hashCode: 706917165
2026-02-02T15:31:46.529285 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.529285 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.529285 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.529285 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.529285 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.530300 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.530300 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 196293710, network.listenAddresses: []
2026-02-02T15:31:46.530300 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:46.530300 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.530981 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 196293710, network.listenAddresses: []
2026-02-02T15:31:46.530981 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:31:46.531993 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:46.531993 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4001 with ID: 12D3KooWCJY9DVkkq3h9vF4TxV2oKvdmzF1tTBdFNmVPfKMTGXvz
2026-02-02T15:31:46.531993 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:46.532992 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.532992 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:46.532992 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:46.535015 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:46.535015 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.536021 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:31:46.536021 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:46.536021 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.536021 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.536021 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:46.537019 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.537019 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.538021 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.538021 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.538021 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.539018 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.540018 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 7ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.541017 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.541017 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.541017 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:46.542018 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:46.542018 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.542018 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.543016 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:46.563010 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.563010 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.563010 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.563010 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.564010 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.564010 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 21ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.569621 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 27ms (dial: 27ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.570622 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.570622 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.570622 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:46.572622 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:46.578652 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.579303 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.579808 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:46.581962 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.581962 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:54 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.584737 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4101: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101 for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.584737 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4101 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101
2026-02-02T15:31:46.585244 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:46.585244 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.585244 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:31:46.585244 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.585244 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:46.586255 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.587256 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:46.587256 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:46.587256 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.587256 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.587256 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.587256 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
00:54 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.588763 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.588763 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.588763 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.589768 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 17ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.589768 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 18ms (dial: 17ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.589768 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.589768 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.589768 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:46.590768 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:46.590768 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.590768 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.591767 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:46.591767 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.591767 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.592768 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.592768 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.593767 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.594359 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.596036 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 5ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.596036 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.596036 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.596036 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:46.597548 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:46.597548 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:46.597548 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:46.597548 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:46.597548 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should connect to another peer
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.598639 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:46.598639 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:46.598639 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:46.599639 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:46.599639 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.599639 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:46.599639 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.601146 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 30442716, network.listenAddresses: []
2026-02-02T15:31:46.604210 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.604210 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, Host hashCode: 1001852740
2026-02-02T15:31:46.604210 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.604210 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.604210 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.605211 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.605718 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:46.605718 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.606723 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:46.606723 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.606723 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, Host hashCode: 1001852740
2026-02-02T15:31:46.607722 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.608722 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.608722 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.608722 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.611298 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:46.611298 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:46.611298 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:46.611298 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.612320 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 30442716, network.listenAddresses: []
2026-02-02T15:31:46.612320 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.612320 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 30442716, network.listenAddresses: []
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.612320 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.612320 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.613825 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:46.614146 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.614146 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.614146 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, Host hashCode: 1001852740
2026-02-02T15:31:46.614652 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.614652 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.614652 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.614652 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.614652 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.614652 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.615664 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.615664 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 30442716, network.listenAddresses: []
2026-02-02T15:31:46.615664 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:46.615664 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.615664 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 30442716, network.listenAddresses: []
2026-02-02T15:31:46.615664 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:31:46.615664 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.615664 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.615664 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - Initial _network.listenAddresses: []
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.615664 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4101 with ID: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:46.615664 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.626600 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa, Host hashCode: 1063517613
2026-02-02T15:31:46.629599 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.630599 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.630599 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.630599 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.631599 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:46.632600 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.640811 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.641315 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:46.651837 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:46.651837 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:46.652836 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.652836 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:31:46.652836 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:46.652836 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.653835 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.653835 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:46.653835 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.653835 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.674834 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.674834 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.675833 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.675833 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 23ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.675833 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 34ms (dial: 23ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.676833 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.676833 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.676833 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:46.677832 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:46.677832 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.677832 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.677832 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:46.677832 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.678832 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.689338 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.690339 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.690339 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.691338 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 12ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.691338 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 14ms (dial: 13ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.691338 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.691338 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.692336 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:46.693336 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:46.693336 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.694336 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.694336 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:46.694336 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.694336 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.698337 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.698337 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.699334 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.699334 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.699334 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 5ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.700335 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.700335 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.701335 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.718015 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:46.719014 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:46.719014 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:46.719014 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:46.719014 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:46.719014 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:46.720013 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:46.720013 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:46.720013 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:46.720013 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:46.720013 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:46.721014 [INFO] [Config] [Config.newNode] for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa: Host created. Listening will be handled by host.start().
2026-02-02T15:31:46.721014 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.722012 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa, network.hashCode: 580440142, initial network.listenAddresses: []
2026-02-02T15:31:46.722012 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:46.722012 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:31:46.722012 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:46.722012 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.722012 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:46.722012 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.723013 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.723013 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.725883 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:46.726402 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.726402 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.726402 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:46.726402 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.726402 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.732579 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.732579 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.732579 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.733590 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 7ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.733590 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 7ms (dial: 7ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.735098 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.735098 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.735098 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:46.736115 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.737115 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.738623 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.738623 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Initial _network.listenAddresses: []
2026-02-02T15:31:46.739623 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, Host hashCode: 591177106
2026-02-02T15:31:46.739623 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.740622 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.740622 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.742621 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:46.742621 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:46.745619 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.807596 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58538 for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.807596 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58538
2026-02-02T15:31:46.808659 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58538. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58538] for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.808659 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.808659 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58538 for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:46.808659 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.808659 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58538
2026-02-02T15:31:46.808659 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa.
2026-02-02T15:31:46.809840 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.809840 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.809840 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.809840 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.809840 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.809840 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.809840 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:46.810869 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.810869 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.811870 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.811870 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.811870 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58538
2026-02-02T15:31:46.811870 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58538
2026-02-02T15:31:46.811870 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.811870 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.811870 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.811870 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.813377 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.813377 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.813696 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - Returning: [/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538]
2026-02-02T15:31:46.836359 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:46.837359 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.837359 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 580440142, network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.838358 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.839359 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa, Host hashCode: 1063517613
2026-02-02T15:31:46.839359 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.839359 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.839359 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.839359 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.840357 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58538
2026-02-02T15:31:46.840357 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58538
2026-02-02T15:31:46.840357 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.841359 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.841359 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.841359 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.841359 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.841359 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.842357 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - Returning: [/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538]
2026-02-02T15:31:46.842357 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.842357 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.847904 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:46.847904 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:46.847904 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:46.848410 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:46.848410 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:46.848410 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:46.848410 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.842357 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
00:54 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:46.848410 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:46.849347 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:46.849347 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:46.849853 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:46.849853 [INFO] [Config] [Config.newNode] for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: Host created. Listening will be handled by host.start().
2026-02-02T15:31:46.849853 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.849853 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, network.hashCode: 291997058, initial network.listenAddresses: []
2026-02-02T15:31:46.850869 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:46.850869 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4102]. Attempting to listen via _network.listen().
2026-02-02T15:31:46.851375 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:46.851375 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4102] for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:46.851375 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:46.851375 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:46.851375 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4102 with transport TCPTransport for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:46.852388 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4102 with transport TCPTransport
00:54 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.849853 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa, Host hashCode: 1063517613
2026-02-02T15:31:46.852993 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.852993 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.854009 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.854009 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.854009 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58538
2026-02-02T15:31:46.854009 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58538
2026-02-02T15:31:46.854009 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.855832 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.855832 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.855832 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.855832 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.856854 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.856854 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - Returning: [/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538]
2026-02-02T15:31:46.856854 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.859362 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:46.859362 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:46.859362 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:46.859362 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.859362 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 580440142, network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.860362 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.860362 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 580440142, network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.860362 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.861244 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:46.861244 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa, Host hashCode: 1063517613
2026-02-02T15:31:46.861244 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.862343 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.862343 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.862343 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.862343 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58538
2026-02-02T15:31:46.862343 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58538 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58538
2026-02-02T15:31:46.862343 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.863847 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58538 (first component not IP)
2026-02-02T15:31:46.863847 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.863847 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.864440 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.864440 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538}
2026-02-02T15:31:46.864440 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa - Returning: [/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538]
2026-02-02T15:31:46.864440 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58538, /ip4/172.29.112.1/tcp/58538] for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.864440 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.865469 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.865469 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 580440142, network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.865469 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:46.865469 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.865469 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 580440142, network.listenAddresses: [/ip4/0.0.0.0/tcp/58538]
2026-02-02T15:31:46.867306 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:46.867811 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:46.867811 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:46.867811 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:46.868838 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.868838 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:46.869934 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:46.869934 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:46.869934 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.869934 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:46.869934 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:46.869934 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:46.871437 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:46.871437 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.871437 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:46.871437 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.875455 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.875455 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.875455 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.876460 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.876460 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 7ms (dial: 6ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.876968 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.876968 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.876968 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:46.877473 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:46.877473 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.877473 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:46.877473 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:46.878475 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.878475 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.878981 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.878981 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.879493 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.880007 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.880007 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.880007 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.880007 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.880007 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:46.880613 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:46.880613 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.880613 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:46.880613 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:46.880613 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.882154 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.882765 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.883779 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.884779 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.885283 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 4ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.885283 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 4ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.885283 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.885283 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.885283 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:46.886320 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:46.886320 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.886320 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:46.886320 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:46.887321 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:46.887321 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:46.887321 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:46.887321 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.888555 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.888555 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.888555 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:77:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:46.889555 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:46.889555 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:46.889555 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:31:46.889555 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:46.889555 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:46.891062 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:46.891062 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:46.891062 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:46.891062 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:54 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should connect to another peer
00:54 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.893363 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:46.893363 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:46.893363 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:46.893363 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:46.893363 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:46.897902 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should connect to another peer
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:46.901438 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:46.901438 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:46.907199 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:46.907707 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:46.907707 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.907707 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:46.908961 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.908961 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - Initial _network.listenAddresses: []
2026-02-02T15:31:46.908961 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye, Host hashCode: 72780427
2026-02-02T15:31:46.908961 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.908961 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:46.908961 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:46.910085 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:46.910085 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:46.910085 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.009186 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4102. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.009186 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4102 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4102
2026-02-02T15:31:47.009186 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4102. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4102] for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.009186 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.009186 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:47.010185 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.010185 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4102
2026-02-02T15:31:47.010185 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:47.010185 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.010185 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.010185 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.010185 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.010185 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.011184 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.011184 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:47.011184 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.011184 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.011184 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.011184 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.011184 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:31:47.012184 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
2026-02-02T15:31:47.012184 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.012184 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.012690 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.012690 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.013198 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.013198 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.013629 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
2026-02-02T15:31:47.036323 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:47.036323 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.036323 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 291997058, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.038854 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:47.038854 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, Host hashCode: 591177106
2026-02-02T15:31:47.038854 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.038854 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.038854 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.039857 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.039857 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:31:47.039857 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
2026-02-02T15:31:47.039857 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.040858 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.040858 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.040858 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.041857 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.041857 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.041857 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
2026-02-02T15:31:47.042858 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.042858 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:47.042858 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:47.042858 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, Host hashCode: 591177106
2026-02-02T15:31:47.043857 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.043857 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.043857 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.044495 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.045004 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:31:47.045004 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
2026-02-02T15:31:47.045004 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.045004 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.045004 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.045004 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.046008 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.046008 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.046513 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
2026-02-02T15:31:47.046513 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.048019 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:47.048019 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:47.048019 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:47.049023 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.049528 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 291997058, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.049528 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.049528 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 291997058, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.049528 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.050532 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:47.050532 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, Host hashCode: 591177106
2026-02-02T15:31:47.052531 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.053532 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.053532 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.053532 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.053532 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:31:47.053532 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
2026-02-02T15:31:47.053532 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.054531 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:31:47.054531 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.054531 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.054531 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.055530 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:31:47.055530 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
2026-02-02T15:31:47.055530 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102] for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.056530 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.056530 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.056530 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 291997058, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.056530 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:47.057530 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.057530 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 291997058, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:47.057530 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:47.058529 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:47.060528 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4102 with ID: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.061527 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:47.063528 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:47.064528 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:47.065527 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:47.065527 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:47.065527 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:47.065527 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:47.066527 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:47.066527 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:47.066527 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:47.066527 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.067275 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:47.067275 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.075922 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.077437 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.079441 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.080440 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 14ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.080440 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 15ms (dial: 14ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.080440 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:47.080440 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.081441 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:47.081441 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:47.081441 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:47.081441 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:47.082440 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:47.082440 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.082440 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.085439 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.085919 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.086424 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.086424 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 4ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.086424 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 4ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.086424 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:47.086424 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.087438 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:47.087944 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:47.087944 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:47.087944 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:47.087944 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:47.087944 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.088947 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.088947 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.088947 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.089948 [FINE] [basichost] Discovered 2 network interfaces
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.089948 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.089948 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:47.090454 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.090454 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.090454 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:47.090454 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.090454 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 3ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.090454 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:47.090958 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.090958 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.090958 [FINE] [basichost] Interface discovery completed. Found 2 addresses
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.090958 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.090958 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.090958 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.090958 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:47.090958 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:47.090958 [INFO] [Config] [Config.newNode] for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye: Host created. Listening will be handled by host.start().
2026-02-02T15:31:47.090958 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.090958 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.090958 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye, network.hashCode: 634808129, initial network.listenAddresses: []
2026-02-02T15:31:47.091972 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.091972 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.091972 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.091972 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.091972 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.091972 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.091972 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.091972 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.091972 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.091972 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.091972 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.091972 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.091972 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.092971 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.092971 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.092971 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.093694 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.093694 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.093694 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:47.094699 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.094699 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4102/p2p/12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.095703 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, existing_conns=0
2026-02-02T15:31:47.095703 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN"
2026-02-02T15:31:47.095703 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN"
2026-02-02T15:31:47.096209 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Dialing.
2026-02-02T15:31:47.096209 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.097723 [FINE] [Swarm] Dialing 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.097723 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4102 (priority 1)
2026-02-02T15:31:47.097723 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:47.244264 [FINE] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4102, Socket Remote: 127.0.0.1:58539
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.264737 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58540 for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.264737 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58540
2026-02-02T15:31:47.264737 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58540. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58540] for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.264737 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.265735 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58540 for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:47.265735 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.265735 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58540
2026-02-02T15:31:47.265735 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye.
2026-02-02T15:31:47.265735 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.266736 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.266736 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.266736 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.266736 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.266736 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.266736 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:47.267733 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.268735 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.268735 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.268735 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.269733 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58540
2026-02-02T15:31:47.269733 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58540
2026-02-02T15:31:47.269733 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.270734 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.270734 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.270734 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - resolvedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.270734 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.271732 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.271732 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - Returning: [/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540]
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.280730 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067907272-6067
00:54 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.281731 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:47.282731 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.282731 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 634808129, network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.284730 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:47.284730 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye, Host hashCode: 72780427
2026-02-02T15:31:47.284730 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.284730 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.285730 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.285730 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.285730 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58540
2026-02-02T15:31:47.285730 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58540
2026-02-02T15:31:47.285730 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.286730 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.286730 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.286730 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - resolvedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.286730 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.286730 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.287729 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - Returning: [/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540]
2026-02-02T15:31:47.287729 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.287729 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:47.287729 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:47.287729 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye, Host hashCode: 72780427
2026-02-02T15:31:47.287729 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.288729 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.288729 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.288729 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.288729 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58540
2026-02-02T15:31:47.288729 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58540
2026-02-02T15:31:47.289728 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.289728 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.289728 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.289728 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - resolvedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.289728 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.289728 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.290728 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - Returning: [/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540]
2026-02-02T15:31:47.290728 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.291727 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:47.291727 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:47.291727 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:47.291727 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.291727 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 634808129, network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.291727 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.292727 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 634808129, network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.292727 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.292727 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:47.292727 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye, Host hashCode: 72780427
2026-02-02T15:31:47.293726 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.293726 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.293726 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.293726 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.293726 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58540
2026-02-02T15:31:47.293726 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58540 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58540
2026-02-02T15:31:47.294726 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.294726 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58540 (first component not IP)
2026-02-02T15:31:47.294726 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.294726 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - resolvedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.294726 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
2026-02-02T15:31:47.294726 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540}
00:54 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.296726 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:47.303966 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(179b98bf) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:47.303966 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(179b98bf) ASYNC WAIT. Requested: null. Buffer: 0
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.343296 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye - Returning: [/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540]
2026-02-02T15:31:47.343296 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58540, /ip4/172.29.112.1/tcp/58540] for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.343296 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
00:55 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.347056 [FINE] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58539, Socket Remote: 127.0.0.1:4102
2026-02-02T15:31:47.347056 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067907347-539
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.348056 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
00:55 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.348056 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWFS8KQ2oRGXAndSyzWKiPy2foA29AghgXfgR5rTwUZn5x
2026-02-02T15:31:47.355589 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:47.361095 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:47.362095 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(de083368) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:47.362095 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(de083368) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:47.372092 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:47.372092 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(179b98bf) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.372092 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(179b98bf) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:47.374091 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:47.375090 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:47.375090 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:47.375090 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:47.376090 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:47.376090 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:47.376090 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(5b6094e6) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:47.376090 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(5b6094e6) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:47.376090 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:47.376090 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(de083368) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.376090 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(de083368) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:47.377091 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 8 bytes: 072f6e6f6973650a
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.378090 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 634808129, network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
2026-02-02T15:31:47.378090 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:47.378787 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58540]
00:55 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.377091 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.446641 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 634808129, network.listenAddresses: [/ip4/0.0.0.0/tcp/58540]
00:55 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.471997 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a9171c1a) START. Requested: null. Buffer: 0 bytes.
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.472997 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:47.472997 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:47.473997 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
2026-02-02T15:31:47.473997 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
00:55 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.477088 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a9171c1a) ASYNC WAIT. Requested: null. Buffer: 0
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.478092 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
00:55 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.482090 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:47.482772 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(5b6094e6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.482772 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(5b6094e6) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:47.482772 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:47.482772 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:47.485787 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:47.485787 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 8 bytes: 072f6e6f6973650a
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.496155 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:47.499673 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
00:55 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.499673 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:47.499673 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a9171c1a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.499673 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a9171c1a) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
00:55 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.499673 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:47.500671 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:47.501673 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:47.502361 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:47.502361 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:47.502905 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:47.506976 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.507982 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:47.508486 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.520829 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.520829 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.524830 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.524830 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 25ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.525826 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 28ms (dial: 25ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.525826 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:47.525826 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.525826 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:47.526333 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:47.526333 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:47.527341 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:47.527341 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:47.527341 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.527341 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.527341 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.528337 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.528337 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.528337 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.528337 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.529338 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:47.529338 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.529338 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:47.529338 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:47.529338 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:47.529338 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:47.530846 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:47.530846 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.530846 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.530846 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.530846 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.531870 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.531870 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.531870 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.531870 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:47.531870 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.532868 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:47.556958 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:47.556958 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:47.556958 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:47.556958 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:47.557958 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:47.557958 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:47.557958 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:47.557958 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.558958 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.558958 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.558958 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 26ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:89:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:47.558958 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:47.558958 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:47.560464 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4001
2026-02-02T15:31:47.560464 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /ip4/127.0.0.1/tcp/4001
Error: Invalid argument(s): Multiaddress must contain /p2p/<peerId>
Stack trace: null
2026-02-02T15:31:47.569466 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:47.569466 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:47.569466 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:47.570468 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:47.570468 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:47.570468 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should connect to another peer
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.571469 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:47.571469 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:47.571469 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:47.571469 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:47.571469 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:47.573467 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:47.573467 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:47.577465 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:47.578465 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:47.578465 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:47.579465 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:47.581467 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:47.582464 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - Initial _network.listenAddresses: []
2026-02-02T15:31:47.582464 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13, Host hashCode: 141534331
2026-02-02T15:31:47.582464 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:47.583463 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:47.583463 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.583463 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:47.583463 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:47.585463 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.588461 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:47.589461 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 34 bytes: 0020978dbcbbce51a045914d0106020e9f8fe65e8a02fd497966d08f2082e8b84864
2026-02-02T15:31:47.590460 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:47.590460 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:47.590460 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:47.592459 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:47.592459 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:47.600164 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(cb490071) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:47.600164 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(cb490071) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:47.607516 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 0020978dbcbbce51a045914d0106020e9f8fe65e8a02fd497966d08f2082e8b84864
2026-02-02T15:31:47.607516 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(cb490071) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.607516 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(cb490071) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 978dbcbbce51a045914d0106020e9f8fe65e8a02fd497966d08f2082e8b84864
2026-02-02T15:31:47.607516 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(32df29b0) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:47.607516 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(32df29b0) END (from buffer). Returning 32 bytes: 978dbcbbce51a045914d0106020e9f8fe65e8a02fd497966d08f2082e8b84864. Buffer after: 0 bytes: 
2026-02-02T15:31:47.607516 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:47.659905 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:47.659905 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 202 bytes: 00c89918302087348d3d5adec1be9ae0861a0b282993053a04936f26d256d7752f1ee7debc346c705a31e63b6db3a06da18fb3574e290b5ccb17646cdaef4b36e22366e0cc4671de93acd4f472412b1a55bbe2a204c166e56f25ca1e793eea6bc0cf3a0dbea2c52a8d12fb5da9ec002c4aeb783fa0a85d21001c96c730541e841a445fbf424edea9e3c213d98694c436e15206cda574488929b42dcde169386beea1009a567ad6322c1af6d973b53098910fbb31dfc9b65e2da1bfd7b15824f1fc02c5d0f6f6c7796a87
2026-02-02T15:31:47.661919 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 34 bytes successfully. Data preview (hex): 0020978dbcbbce51a045914d0106020e9f8fe65e...
2026-02-02T15:31:47.661919 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(84bd3ad0) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:47.661919 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(84bd3ad0) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:47.664474 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c89918302087348d3d5adec1be9ae0861a0b282993053a04936f26d256d7752f1ee7debc346c705a31e63b6db3a06da18fb3574e290b5ccb17646cdaef4b36e22366e0cc4671de93acd4f472412b1a55bbe2a204c166e56f25ca1e793eea6bc0cf3a0dbea2c52a8d12fb5da9ec002c4aeb783fa0a85d21001c96c730541e841a445fbf424edea9e3c213d98694c436e15206cda574488929b42dcde169386beea1009a567ad6322c1af6d973b53098910fbb31dfc9b65e2da1bfd7b15824f1fc02c5d0f6f6c7796a87
2026-02-02T15:31:47.664784 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(84bd3ad0) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.664784 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(84bd3ad0) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 9918302087348d3d5adec1be9ae0861a0b282993053a04936f26d256d7752f1ee7debc346c705a31e63b6db3a06da18fb3574e290b5ccb17646cdaef4b36e22366e0cc4671de93acd4f472412b1a55bbe2a204c166e56f25ca1e793eea6bc0cf3a0dbea2c52a8d12fb5da9ec002c4aeb783fa0a85d21001c96c730541e841a445fbf424edea9e3c213d98694c436e15206cda574488929b42dcde169386beea1009a567ad6322c1af6d973b53098910fbb31dfc9b65e2da1bfd7b15824f1fc02c5d0f6f6c7796a87
2026-02-02T15:31:47.664784 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a2f05cb5) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:31:47.664784 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a2f05cb5) END (from buffer). Returning 200 bytes: 9918302087348d3d5adec1be9ae0861a0b282993053a04936f26d256d7752f1ee7debc346c705a31e63b6db3a06da18fb3574e290b5ccb17646cdaef4b36e22366e0cc4671de93acd4f472412b1a55bbe2a204c166e56f25ca1e793eea6bc0cf3a0dbea2c52a8d12fb5da9ec002c4aeb783fa0a85d21001c96c730541e841a445fbf424edea9e3c213d98694c436e15206cda574488929b42dcde169386beea1009a567ad6322c1af6d973b53098910fbb31dfc9b65e2da1bfd7b15824f1fc02c5d0f6f6c7796a87. Buffer after: 0 bytes: 
2026-02-02T15:31:47.664784 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:31:47.693096 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:47.693096 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 170 bytes: 00a8e336084ecb0b4bc6c437d01208f78ce779786a49f7d297a08f705a5e4b995441292aa4e1190ea54cc16d552aaa9f226043ab7aefd34a41e917b5f3205f55401cccd84cfd15bbcd83928084fe27d4fbcef2232cc7651f1fd39a071ec5e8764ef9042c1d4e2200862321228dbe6a31718330296cc7916bc4b228458da663e858f950330b2c1d283b771063625c24d5bd8dcabfe4565c3fe6863949f73e00351a9fdcbfd0c062057a19
2026-02-02T15:31:47.693096 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 170 bytes successfully. Data preview (hex): 00a8e336084ecb0b4bc6c437d01208f78ce77978...
2026-02-02T15:31:47.693096 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.699182 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:47.699182 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1065140705
2026-02-02T15:31:47.700181 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1063195847
2026-02-02T15:31:47.703181 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:47.703181 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:47.706179 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:47.707179 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:47.707179 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:47.708178 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:47.708178 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 38 bytes: 00243029c819f90b01c057e3c0f6d6e2e5d6a2caaf02c989237a3bb170d19e7c3b2ad4707143
2026-02-02T15:31:47.708178 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 202 bytes successfully. Data preview (hex): 00c89918302087348d3d5adec1be9ae0861a0b28...
2026-02-02T15:31:47.709178 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(140f0365) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:47.709178 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(140f0365) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:47.709178 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (208 bytes): 00a8e336084ecb0b4bc6c437d01208f78ce779786a49f7d297a08f705a5e4b995441292aa4e1190ea54cc16d552aaa9f226043ab7aefd34a41e917b5f3205f55401cccd84cfd15bbcd83928084fe27d4fbcef2232cc7651f1fd39a071ec5e8764ef9042c1d4e2200862321228dbe6a31718330296cc7916bc4b228458da663e858f950330b2c1d283b771063625c24d5bd8dcabfe4565c3fe6863949f73e00351a9fdcbfd0c062057a1900243029c819f90b01c057e3c0f6d6e2e5d6a2caaf02c989237a3bb170d19e7c3b2ad4707143
2026-02-02T15:31:47.710179 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(140f0365) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.710179 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(140f0365) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 206 bytes: e336084ecb0b4bc6c437d01208f78ce779786a49f7d297a08f705a5e4b995441292aa4e1190ea54cc16d552aaa9f226043ab7aefd34a41e917b5f3205f55401cccd84cfd15bbcd83928084fe27d4fbcef2232cc7651f1fd39a071ec5e8764ef9042c1d4e2200862321228dbe6a31718330296cc7916bc4b228458da663e858f950330b2c1d283b771063625c24d5bd8dcabfe4565c3fe6863949f73e00351a9fdcbfd0c062057a1900243029c819f90b01c057e3c0f6d6e2e5d6a2caaf02c989237a3bb170d19e7c3b2ad4707143
2026-02-02T15:31:47.710179 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(51cfd14a) START. Requested: 168. Buffer: 206 bytes.
2026-02-02T15:31:47.710179 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(51cfd14a) END (from buffer). Returning 168 bytes: e336084ecb0b4bc6c437d01208f78ce779786a49f7d297a08f705a5e4b995441292aa4e1190ea54cc16d552aaa9f226043ab7aefd34a41e917b5f3205f55401cccd84cfd15bbcd83928084fe27d4fbcef2232cc7651f1fd39a071ec5e8764ef9042c1d4e2200862321228dbe6a31718330296cc7916bc4b228458da663e858f950330b2c1d283b771063625c24d5bd8dcabfe4565c3fe6863949f73e00351a9fdcbfd0c062057a19. Buffer after: 38 bytes: 00243029c819f90b01c057e3c0f6d6e2e5d6a2caaf02c989237a3bb170d19e7c3b2ad4707143
2026-02-02T15:31:47.711783 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:47.732958 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:47.732958 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:47.732958 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1063195847
2026-02-02T15:31:47.734128 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1065140705
2026-02-02T15:31:47.735291 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:47.736812 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:47.738332 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.739466 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.739466 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:47.740463 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:47.740967 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.742010 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:47.742010 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:47.748511 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.766508 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.767509 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(db523df8) START. Requested: 2. Buffer: 38 bytes.
2026-02-02T15:31:47.768509 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(db523df8) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 3029c819f90b01c057e3c0f6d6e2e5d6a2caaf02c989237a3bb170d19e7c3b2ad4707143
2026-02-02T15:31:47.768509 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:47.769509 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.769509 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:47.769509 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:47.770508 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:47.771510 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:47.771510 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:47.771510 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(a639b96e) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:47.771510 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(a639b96e) END (from buffer). Returning 36 bytes: 3029c819f90b01c057e3c0f6d6e2e5d6a2caaf02c989237a3bb170d19e7c3b2ad4707143. Buffer after: 0 bytes: 
2026-02-02T15:31:47.771510 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [48, 41, 200, 25]
2026-02-02T15:31:47.771510 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:47.772509 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 3029c819f90b01c057e3c0f6d6e2e5d6a2caaf02c989237a3bb170d19e7c3b2ad4707143
2026-02-02T15:31:47.772509 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:47.772509 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:47.772509 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 3029c819f90b01c057e3c0f6d6e2e5d6a2caaf02
2026-02-02T15:31:47.772509 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c989237a3bb170d19e7c3b2ad4707143
2026-02-02T15:31:47.772509 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [48, 41, 200, 25]
2026-02-02T15:31:47.772509 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [201, 137, 35, 122]
2026-02-02T15:31:47.773508 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [201, 137, 35, 122, 59, 177, 112, 209, 158, 124, 59, 42, 212, 112, 113, 67]
2026-02-02T15:31:47.773508 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.773508 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:47.774508 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:47.774508 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:47.774508 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:47.774508 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.774508 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:47.775507 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:47.775507 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:47.775507 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:47.775507 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:47.775507 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:47.775507 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 38 bytes: 00245728bc62dd75db38b64ad6d52f48ea621d6305c58bdd22b5a35e41290c29c81d55ee449c
2026-02-02T15:31:47.776507 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 38 bytes successfully. Data preview (hex): 00245728bc62dd75db38b64ad6d52f48ea621d63...
2026-02-02T15:31:47.776507 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:47.776507 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:47.777508 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:47.777508 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.781553 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.781553 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.781553 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:47.781553 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:47.781553 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.781553 [FINE] [basichost] Discovered 2 network interfaces
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.781553 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.781553 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:47.781553 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.782568 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(e4f47f55) START. Requested: 2. Buffer: 0 bytes.
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.782568 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.782568 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(e4f47f55) ASYNC WAIT. Requested: 2. Buffer: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.782568 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:47.782568 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.782568 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 38 bytes successfully. Data preview (hex): 00243029c819f90b01c057e3c0f6d6e2e5d6a2ca...
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.782568 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:47.782568 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:47.782568 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:47.782568 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.782568 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:47.782568 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.782568 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.782568 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.783567 [INFO] [Config] [Config.newNode] for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13: Host created. Listening will be handled by host.start().
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.783567 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.783567 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.783567 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.783567 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13, network.hashCode: 792669621, initial network.listenAddresses: []
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.783567 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.783567 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.783567 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.783567 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.783567 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:31:47.783567 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.783567 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(831d5598) START. Requested: 2. Buffer: 0 bytes.
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.783567 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.784566 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(831d5598) ASYNC WAIT. Requested: 2. Buffer: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.784566 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:47.784566 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:47.785072 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:47.785072 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.786093 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 00245728bc62dd75db38b64ad6d52f48ea621d6305c58bdd22b5a35e41290c29c81d55ee449c
2026-02-02T15:31:47.786093 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(831d5598) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.786093 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(831d5598) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 5728bc62dd75db38b64ad6d52f48ea621d6305c58bdd22b5a35e41290c29c81d55ee449c
2026-02-02T15:31:47.786093 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:47.786093 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.786093 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:47.787092 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:47.787092 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:47.787092 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:47.787092 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:47.787092 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(8a278299) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:47.787092 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(8a278299) END (from buffer). Returning 36 bytes: 5728bc62dd75db38b64ad6d52f48ea621d6305c58bdd22b5a35e41290c29c81d55ee449c. Buffer after: 0 bytes: 
2026-02-02T15:31:47.787092 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [87, 40, 188, 98]
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 5728bc62dd75db38b64ad6d52f48ea621d6305c58bdd22b5a35e41290c29c81d55ee449c
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5728bc62dd75db38b64ad6d52f48ea621d6305c5
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8bdd22b5a35e41290c29c81d55ee449c
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [87, 40, 188, 98]
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [139, 221, 34, 181]
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [139, 221, 34, 181, 163, 94, 65, 41, 12, 41, 200, 29, 85, 238, 68, 156]
2026-02-02T15:31:47.788091 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.788091 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:47.789598 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:47.789598 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:47.789598 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:47.789598 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.789598 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:47.790603 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:47.790603 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:47.790603 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:47.790603 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 32 bytes: 001e8fbb509c31ac84b00a93e58082b7d317d9a5de0af25768a8a8aba7ca2272
2026-02-02T15:31:47.792602 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 32 bytes successfully. Data preview (hex): 001e8fbb509c31ac84b00a93e58082b7d317d9a5...
2026-02-02T15:31:47.792602 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:47.792602 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.792602 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.792602 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.792602 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:47.793604 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:47.794602 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.795153 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.795153 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(20638290) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:47.795153 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(20638290) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:47.795659 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e8fbb509c31ac84b00a93e58082b7d317d9a5de0af25768a8a8aba7ca2272
2026-02-02T15:31:47.795659 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(e4f47f55) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.795659 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(e4f47f55) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 8fbb509c31ac84b00a93e58082b7d317d9a5de0af25768a8a8aba7ca2272
2026-02-02T15:31:47.796663 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:47.796663 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.796663 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:47.796663 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:47.797314 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:47.797314 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:47.797314 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:47.797314 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(65872060) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:47.797314 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(65872060) END (from buffer). Returning 30 bytes: 8fbb509c31ac84b00a93e58082b7d317d9a5de0af25768a8a8aba7ca2272. Buffer after: 0 bytes: 
2026-02-02T15:31:47.797314 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [143, 187, 80, 156]
2026-02-02T15:31:47.797314 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:47.797314 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 8fbb509c31ac84b00a93e58082b7d317d9a5de0af25768a8a8aba7ca2272
2026-02-02T15:31:47.798319 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:47.798319 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:47.798319 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8fbb509c31ac84b00a93e58082b7
2026-02-02T15:31:47.798319 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: d317d9a5de0af25768a8a8aba7ca2272
2026-02-02T15:31:47.798319 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [143, 187, 80, 156]
2026-02-02T15:31:47.798319 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [211, 23, 217, 165]
2026-02-02T15:31:47.799239 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [211, 23, 217, 165, 222, 10, 242, 87, 104, 168, 168, 171, 167, 202, 34, 114]
2026-02-02T15:31:47.799239 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.799239 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:47.800038 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:47.800038 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:47.800038 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:47.800038 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.800038 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:47.800038 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:47.800038 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:47.801554 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:47.801554 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:47.802074 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:47.802074 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:47.802074 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 32 bytes: 001e8b838c7faecb0f3a7242e71bb49771b16c981d47c516cf78b4c31056a932
2026-02-02T15:31:47.802074 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 32 bytes successfully. Data preview (hex): 001e8b838c7faecb0f3a7242e71bb49771b16c98...
2026-02-02T15:31:47.803089 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:47.803089 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:47.803089 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:47.803089 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:47.809929 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:47.811930 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067907811-6067
2026-02-02T15:31:47.814957 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:47.815961 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:47.815961 [FINE] [SwarmConn] SwarmConn (0): Context set: bb9ac88b-f5d8-4054-b159-18a7508ac5cf
2026-02-02T15:31:47.816960 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, conn_id=0
2026-02-02T15:31:47.821030 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA": 1
2026-02-02T15:31:47.826691 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:31:47.826691 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:47.828199 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. Conn ID: 0
2026-02-02T15:31:47.828199 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:47.828704 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:47.830836 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:47.830836 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:47.835681 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e8b838c7faecb0f3a7242e71bb49771b16c981d47c516cf78b4c31056a932
2026-02-02T15:31:47.836685 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(20638290) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.836685 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(20638290) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 8b838c7faecb0f3a7242e71bb49771b16c981d47c516cf78b4c31056a932
2026-02-02T15:31:47.836685 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:47.837333 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.837333 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:47.837333 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:47.837873 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:47.837873 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:47.837873 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:47.837873 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a1e4f15a) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:47.837873 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a1e4f15a) END (from buffer). Returning 30 bytes: 8b838c7faecb0f3a7242e71bb49771b16c981d47c516cf78b4c31056a932. Buffer after: 0 bytes: 
2026-02-02T15:31:47.837873 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [139, 131, 140, 127]
2026-02-02T15:31:47.837873 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:47.837873 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 8b838c7faecb0f3a7242e71bb49771b16c981d47c516cf78b4c31056a932
2026-02-02T15:31:47.838887 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:47.838887 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:47.838887 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8b838c7faecb0f3a7242e71bb497
2026-02-02T15:31:47.838887 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 71b16c981d47c516cf78b4c31056a932
2026-02-02T15:31:47.838887 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [139, 131, 140, 127]
2026-02-02T15:31:47.838887 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [113, 177, 108, 152]
2026-02-02T15:31:47.838887 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [113, 177, 108, 152, 29, 71, 197, 22, 207, 120, 180, 195, 16, 86, 169, 50]
2026-02-02T15:31:47.839887 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.839887 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:47.839887 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:47.839887 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:47.839887 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:47.840886 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.840886 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.841887 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:47.841887 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:47.841887 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.841887 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067907841-539
2026-02-02T15:31:47.842887 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.842887 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:47.842887 [FINE] [SwarmConn] SwarmConn (0): Context set: 77a067b3-3609-40c0-899d-362d647588ec
2026-02-02T15:31:47.844886 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 747ms
2026-02-02T15:31:47.845885 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:47.845885 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.845885 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.845885 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.845885 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:47.845885 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:47.845885 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:47.845885 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.845885 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.845885 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(35457735) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:47.847392 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(35457735) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:47.849397 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:47.849397 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.849397 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.849397 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.849397 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:47.850396 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:47.850396 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:47.850396 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.850396 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.850396 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(e0e6d5d3) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:47.850396 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(e0e6d5d3) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:47.865645 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:31:47.865645 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:47.865645 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 0
2026-02-02T15:31:47.866205 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:47.866205 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:47.866205 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:47.872349 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Context HashCode: 848847837
2026-02-02T15:31:47.872349 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:47.873496 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:47.873496 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:47.876504 [FINE] [YamuxStream] [1][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:47.879564 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.880074 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:47.880074 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:47.880644 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 0
2026-02-02T15:31:47.880644 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:47.880644 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:47.880644 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 30 bytes: 001cd61d4c00314b79a43f43d0e948690115d4acfee8ccd2363daabffd73
2026-02-02T15:31:47.883037 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cd61d4c00314b79a43f43d0e948690115d4acfee8ccd2363daabffd73
2026-02-02T15:31:47.883037 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(35457735) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.883037 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(35457735) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: d61d4c00314b79a43f43d0e948690115d4acfee8ccd2363daabffd73
2026-02-02T15:31:47.883037 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:47.884549 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.885556 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:47.885556 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:47.886062 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:47.886062 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:47.886062 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:47.886062 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(d5c7e2f9) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:47.886062 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(d5c7e2f9) END (from buffer). Returning 28 bytes: d61d4c00314b79a43f43d0e948690115d4acfee8ccd2363daabffd73. Buffer after: 0 bytes: 
2026-02-02T15:31:47.887067 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [214, 29, 76, 0]
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: d61d4c00314b79a43f43d0e948690115d4acfee8ccd2363daabffd73
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d61d4c00314b79a43f43d0e9
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 48690115d4acfee8ccd2363daabffd73
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [214, 29, 76, 0]
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [72, 105, 1, 21]
2026-02-02T15:31:47.887067 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [72, 105, 1, 21, 212, 172, 254, 232, 204, 210, 54, 61, 170, 191, 253, 115]
2026-02-02T15:31:47.887067 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.888065 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:47.888570 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:47.888570 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:47.888570 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:47.888570 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:47.888570 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.891079 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:47.891079 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:47.891585 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:47.891585 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:47.891585 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 30 bytes: 001c3258d14b085448e831cd658bbe27e4cd7399abeecbf67f26be24fd4c
2026-02-02T15:31:47.891585 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 30 bytes successfully. Data preview (hex): 001c3258d14b085448e831cd658bbe27e4cd7399...
2026-02-02T15:31:47.891585 [FINE] [YamuxStream] [0][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:47.892589 [FINER] [YamuxStream] [0][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:47.892589 [FINE] [YamuxStream] [0][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:47.893094 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:47.893094 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:47.893094 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:47.893094 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:47.893094 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 30 bytes: 001ce7ccdf6ee7d09e11084adc23abc7d860b23d7c8b9e61f6c8c37c2dd8
2026-02-02T15:31:47.893094 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 30 bytes successfully. Data preview (hex): 001cd61d4c00314b79a43f43d0e948690115d4ac...
2026-02-02T15:31:47.894099 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c3258d14b085448e831cd658bbe27e4cd7399abeecbf67f26be24fd4c
2026-02-02T15:31:47.894645 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(e0e6d5d3) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:47.894645 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(e0e6d5d3) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 3258d14b085448e831cd658bbe27e4cd7399abeecbf67f26be24fd4c
2026-02-02T15:31:47.894645 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:47.894645 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.894645 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:47.894645 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:47.894645 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:47.894645 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:47.895658 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:47.895658 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(cdbe5b1f) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:47.896165 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(cdbe5b1f) END (from buffer). Returning 28 bytes: 3258d14b085448e831cd658bbe27e4cd7399abeecbf67f26be24fd4c. Buffer after: 0 bytes: 
2026-02-02T15:31:47.896165 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [50, 88, 209, 75]
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 3258d14b085448e831cd658bbe27e4cd7399abeecbf67f26be24fd4c
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 3258d14b085448e831cd658b
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: be27e4cd7399abeecbf67f26be24fd4c
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [50, 88, 209, 75]
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [190, 39, 228, 205]
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [190, 39, 228, 205, 115, 153, 171, 238, 203, 246, 127, 38, 190, 36, 253, 76]
2026-02-02T15:31:47.896165 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.896165 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:47.897670 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:47.897670 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:47.897670 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:47.898249 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:47.898249 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.899488 [FINER] [YamuxStream] [1][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:47.899488 [FINER] [YamuxStream] [1][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:47.899488 [FINE] [YamuxStream] [1][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:47.900492 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:47.900492 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:47.900492 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:47.900492 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:47.900492 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 30 bytes: 001c5172873323ee56089c788914dd271046f1aaed2f3b5f5fdeaadd5dee
2026-02-02T15:31:47.901492 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 30 bytes successfully. Data preview (hex): 001c5172873323ee56089c788914dd271046f1aa...
2026-02-02T15:31:47.901999 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:47.901999 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:47.902504 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067907902-7693 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.904081 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:47.905143 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:47.905143 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0, duration=34ms
2026-02-02T15:31:47.905655 [FINE] [YamuxStream] [1][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:17.905143
2026-02-02T15:31:47.905655 [FINE] [YamuxStream] [1][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:47.907675 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:47.907675 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:47.909185 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:47.909185 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:47.909185 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:47.909185 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:47.909185 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 50 bytes: 00303c66e26823d48df90647c17ab35fc90000783d38c0740a20bf036f5d8c904d6dc4fca64021fa5c103f13edbbaab05de8
2026-02-02T15:31:47.910222 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 30 bytes successfully. Data preview (hex): 001ce7ccdf6ee7d09e11084adc23abc7d860b23d...
2026-02-02T15:31:47.910222 [FINER] [YamuxStream] [0][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:47.910222 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA on conn 0
2026-02-02T15:31:47.911231 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067907911-6902 for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:47.911231 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:47.914170 [FINEST] [YamuxStream] [0][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:47.918790 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ce7ccdf6ee7d09e11084adc23abc7d860b23d7c8b9e61f6c8c37c2dd8
2026-02-02T15:31:47.919790 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:47.919790 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.919790 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.919790 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.919790 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:47.919790 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:47.919790 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:47.919790 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.919790 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.920788 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(cb17340e) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:47.920788 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(cb17340e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: e7ccdf6ee7d09e11084adc23abc7d860b23d7c8b9e61f6c8c37c2dd8
2026-02-02T15:31:47.920788 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:47.920788 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.920788 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:47.920788 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:47.920788 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:47.920788 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:47.920788 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:47.920788 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(75a5a162) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:47.922292 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(75a5a162) END (from buffer). Returning 28 bytes: e7ccdf6ee7d09e11084adc23abc7d860b23d7c8b9e61f6c8c37c2dd8. Buffer after: 0 bytes: 
2026-02-02T15:31:47.922292 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [231, 204, 223, 110]
2026-02-02T15:31:47.922292 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:47.922292 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e7ccdf6ee7d09e11084adc23abc7d860b23d7c8b9e61f6c8c37c2dd8
2026-02-02T15:31:47.922292 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:47.922292 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:47.922292 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e7ccdf6ee7d09e11084adc23
2026-02-02T15:31:47.923308 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: abc7d860b23d7c8b9e61f6c8c37c2dd8
2026-02-02T15:31:47.923308 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [231, 204, 223, 110]
2026-02-02T15:31:47.924308 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [171, 199, 216, 96]
2026-02-02T15:31:47.924308 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [171, 199, 216, 96, 178, 61, 124, 139, 158, 97, 246, 200, 195, 124, 45, 216]
2026-02-02T15:31:47.924308 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.924308 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:47.925309 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:47.925309 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:47.925309 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:47.925815 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:47.925815 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.925815 [FINER] [YamuxStream] [1][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:47.925815 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c5172873323ee56089c788914dd271046f1aaed2f3b5f5fdeaadd5dee
2026-02-02T15:31:47.926819 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 50 bytes successfully. Data preview (hex): 00303c66e26823d48df90647c17ab35fc9000078...
2026-02-02T15:31:47.926819 [FINE] [YamuxStream] [1][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 19ms
2026-02-02T15:31:47.926819 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:47.927819 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:47.927819 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.927819 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.927819 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.927819 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:47.928818 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:47.928818 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:47.928818 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.928818 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.928818 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(8ab5c580) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:47.928818 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(8ab5c580) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 5172873323ee56089c788914dd271046f1aaed2f3b5f5fdeaadd5dee
2026-02-02T15:31:47.928818 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:47.929818 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.929818 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:47.929818 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:47.929818 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:47.929818 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:47.929818 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:47.929818 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(ca3d4437) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:47.929818 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(ca3d4437) END (from buffer). Returning 28 bytes: 5172873323ee56089c788914dd271046f1aaed2f3b5f5fdeaadd5dee. Buffer after: 0 bytes: 
2026-02-02T15:31:47.929818 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [81, 114, 135, 51]
2026-02-02T15:31:47.930817 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:47.930817 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 5172873323ee56089c788914dd271046f1aaed2f3b5f5fdeaadd5dee
2026-02-02T15:31:47.930817 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:47.930817 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:47.930817 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5172873323ee56089c788914
2026-02-02T15:31:47.930817 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: dd271046f1aaed2f3b5f5fdeaadd5dee
2026-02-02T15:31:47.930817 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [81, 114, 135, 51]
2026-02-02T15:31:47.933815 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [221, 39, 16, 70]
2026-02-02T15:31:47.933815 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [221, 39, 16, 70, 241, 170, 237, 47, 59, 95, 95, 222, 170, 221, 93, 238]
2026-02-02T15:31:47.935816 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:47.936322 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:47.936322 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:47.936322 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:47.936322 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:47.937326 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:47.937326 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:47.938326 [FINER] [YamuxStream] [0][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:47.939326 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:47.939326 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.940325 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.940325 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.940325 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:47.940325 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:47.940325 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:47.940325 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.940325 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.940325 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(210f874b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:47.940325 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(210f874b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:47.941325 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00303c66e26823d48df90647c17ab35fc90000783d38c0740a20bf036f5d8c904d6dc4fca64021fa5c103f13edbbaab05de8
2026-02-02T15:31:47.950320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:47.955319 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:47.957318 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:47.957318 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:47.958319 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:47.958319 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:47.958319 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:47.958319 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:47.958319 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:47.958319 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(62bee59e) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:47.958319 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(62bee59e) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 3c66e26823d48df90647c17ab35fc90000783d38c0740a20bf036f5d8c904d6dc4fca64021fa5c103f13edbbaab05de8
2026-02-02T15:31:47.959319 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:47.959319 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:47.960318 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:47.960318 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:47.960318 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:47.960318 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:47.960318 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:47.963201 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(02e68dcb) START. Requested: 48. Buffer: 48 bytes.
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.964202 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58541 for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:47.964202 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58541
2026-02-02T15:31:47.965202 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58541. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58541] for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:47.965202 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.965202 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58541 for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:47.965202 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.965202 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(02e68dcb) END (from buffer). Returning 48 bytes: 3c66e26823d48df90647c17ab35fc90000783d38c0740a20bf036f5d8c904d6dc4fca64021fa5c103f13edbbaab05de8. Buffer after: 0 bytes: 
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.965202 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58541
2026-02-02T15:31:47.965202 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13.
2026-02-02T15:31:47.965202 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.966200 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [60, 102, 226, 104]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.966200 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.966200 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.966200 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.966200 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.966200 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.966200 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 3c66e26823d48df90647c17ab35fc90000783d38c0740a20bf036f5d8c904d6dc4fca64021fa5c103f13edbbaab05de8
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.966200 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.966200 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.966200 [FINE] [basichost] Attempting to create and persist self signed peer record.
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.966200 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:47.966200 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 3c66e26823d48df90647c17ab35fc90000783d38c0740a20bf036f5d8c904d6d
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.966200 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.966200 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c4fca64021fa5c103f13edbbaab05de8
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.966200 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.967200 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:47.967200 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.967200 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58541
2026-02-02T15:31:47.967200 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58541
2026-02-02T15:31:47.967200 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.967200 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:47.968199 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.968199 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:47.968199 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:47.969199 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:47.969199 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - Returning: [/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:47.966200 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [60, 102, 226, 104]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:47.990468 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:47.991471 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.991471 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 792669621, network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.993471 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:47.993471 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13, Host hashCode: 141534331
2026-02-02T15:31:47.994471 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.994471 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.994471 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:47.994471 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.995471 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58541
2026-02-02T15:31:47.995471 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58541
2026-02-02T15:31:47.995471 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:47.995471 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:47.995471 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:47.996470 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:47.996470 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:47.997470 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:47.997470 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - Returning: [/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541]
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.011315 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [196, 252, 166, 64]
2026-02-02T15:31:48.011315 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [196, 252, 166, 64, 33, 250, 92, 16, 63, 19, 237, 187, 170, 176, 93, 232]
2026-02-02T15:31:48.011315 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:48.011315 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:48.011315 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:48.012320 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:48.012320 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:48.012320 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:48.012320 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.012320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:48.012320 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.013319 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.013319 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.013824 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:48.013824 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:48.013824 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:48.013824 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:48.013824 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.015837 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:48.017835 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:48.018835 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:48.018835 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:48.019836 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:48.019836 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:48.020833 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:48.021834 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:48.021834 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:48.021834 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:48.022833 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 50 bytes: 00304261bf77297d029774fc2206ca194f3da4c364005212de31930ca9c68fa116f4a402d6985b6ec71280f6cd1942829fbe
2026-02-02T15:31:48.022833 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 50 bytes successfully. Data preview (hex): 00304261bf77297d029774fc2206ca194f3da4c3...
2026-02-02T15:31:48.022833 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 2ms
2026-02-02T15:31:48.022833 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:48.022833 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:48.022833 [FINEST] [YamuxStream] [0][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.023832 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:48.027786 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:48.028292 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.028808 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13, Host hashCode: 141534331
2026-02-02T15:31:48.029821 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.029821 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.029821 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:48.029821 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.029821 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58541
2026-02-02T15:31:48.030822 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58541
2026-02-02T15:31:48.030822 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.031327 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:48.031327 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.031327 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:48.031327 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:48.031327 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:48.031327 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - Returning: [/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541]
2026-02-02T15:31:48.032334 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:48.033331 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:48.033331 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:48.033331 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:48.034331 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.034331 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 792669621, network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.034331 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.034331 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 792669621, network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.034331 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:48.034331 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.034331 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13, Host hashCode: 141534331
2026-02-02T15:31:48.034331 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.035835 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.035835 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:48.035835 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.036353 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58541
2026-02-02T15:31:48.036353 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58541 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58541
2026-02-02T15:31:48.036353 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.037356 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58541 (first component not IP)
2026-02-02T15:31:48.037356 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.037356 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:48.037356 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:48.037356 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541}
2026-02-02T15:31:48.037356 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13 - Returning: [/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541]
2026-02-02T15:31:48.038356 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58541, /ip4/172.29.112.1/tcp/58541] for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:48.038356 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:48.038356 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.038356 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 792669621, network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.038356 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:48.038356 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.039356 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 792669621, network.listenAddresses: [/ip4/0.0.0.0/tcp/58541]
2026-02-02T15:31:48.039356 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:48.039356 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.039356 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:48.039356 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:48.040357 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.041356 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:48.041356 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:48.041356 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:48.041356 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.042357 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.042357 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:48.042357 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:48.042357 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.042357 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.043222 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.043222 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.044241 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:48.044681 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.044681 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.044681 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.044681 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:48.045185 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:48.045185 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.045185 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.045185 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.045185 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.045185 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:48.045185 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(aaf74fc6) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:48.045185 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(aaf74fc6) ASYNC WAIT. Requested: 2. Buffer: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.045185 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.045185 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00304261bf77297d029774fc2206ca194f3da4c364005212de31930ca9c68fa116f4a402d6985b6ec71280f6cd1942829fbe
2026-02-02T15:31:48.045185 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(210f874b) ASYNC AWOKE. Re-checking buffer.
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.045185 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.046203 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(210f874b) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 4261bf77297d029774fc2206ca194f3da4c364005212de31930ca9c68fa116f4a402d6985b6ec71280f6cd1942829fbe
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.046203 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 5ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.046203 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.046203 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.046203 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.046203 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.046203 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:48.046203 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:48.046203 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:48.046203 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.047201 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:48.047201 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.047632 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.047632 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.047201 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.047632 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.047632 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.047632 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.048392 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(91f34dcb) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:48.048392 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(91f34dcb) END (from buffer). Returning 48 bytes: 4261bf77297d029774fc2206ca194f3da4c364005212de31930ca9c68fa116f4a402d6985b6ec71280f6cd1942829fbe. Buffer after: 0 bytes: 
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.048392 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.048392 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.048392 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [66, 97, 191, 119]
2026-02-02T15:31:48.048392 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:48.048392 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 4261bf77297d029774fc2206ca194f3da4c364005212de31930ca9c68fa116f4a402d6985b6ec71280f6cd1942829fbe
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.048392 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.048392 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:48.048392 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:48.048392 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4261bf77297d029774fc2206ca194f3da4c364005212de31930ca9c68fa116f4
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.048392 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.048392 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a402d6985b6ec71280f6cd1942829fbe
2026-02-02T15:31:48.049409 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [66, 97, 191, 119]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.049409 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.049409 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [164, 2, 214, 152]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.049409 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.049409 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [164, 2, 214, 152, 91, 110, 199, 18, 128, 246, 205, 25, 66, 130, 159, 190]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.049409 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.049409 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.049409 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.049409 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:48.049409 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.050410 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.050410 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.050410 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.050410 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:48.050410 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.050410 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.050410 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.050410 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:48.050410 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.050410 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.051919 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.051919 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:48.052960 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:48.052960 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:48.052960 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:48.052960 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.052960 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.050410 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.052960 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:48.052960 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:48.052960 [FINE] [YamuxStream] [1][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.054467 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.054467 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.054467 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.054467 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.054467 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:48.054467 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.055473 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.055473 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:48.055473 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.055473 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.055473 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 46 bytes: 002ce872c8a351ef2f01b5fdc88e82c95700d365718e287678c073054f5328a5878c9b2c2a32ad9f145daddf5f8f
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.055473 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 6ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.055473 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.055473 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.055473 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.056474 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.056474 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.056474 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.056474 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.056474 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:48.056474 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:48.056474 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:48.056474 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.056474 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.056474 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.056474 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.056474 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(f8935a51) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:48.056474 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(f8935a51) ASYNC WAIT. Requested: 2. Buffer: 0
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.056474 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:48.057473 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.057473 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002ce872c8a351ef2f01b5fdc88e82c95700d365718e287678c073054f5328a5878c9b2c2a32ad9f145daddf5f8f
2026-02-02T15:31:48.057473 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(aaf74fc6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:48.057473 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(aaf74fc6) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: e872c8a351ef2f01b5fdc88e82c95700d365718e287678c073054f5328a5878c9b2c2a32ad9f145daddf5f8f
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.057473 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.057473 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.057473 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.057473 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:48.057473 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.057473 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.057473 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:48.057473 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.057473 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.057473 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:48.057473 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:48.058472 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(fcca63b9) START. Requested: 44. Buffer: 44 bytes.
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.058472 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.058472 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(fcca63b9) END (from buffer). Returning 44 bytes: e872c8a351ef2f01b5fdc88e82c95700d365718e287678c073054f5328a5878c9b2c2a32ad9f145daddf5f8f. Buffer after: 0 bytes: 
2026-02-02T15:31:48.058472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [232, 114, 200, 163]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.058472 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: e872c8a351ef2f01b5fdc88e82c95700d365718e287678c073054f5328a5878c9b2c2a32ad9f145daddf5f8f
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.058472 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:97:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e872c8a351ef2f01b5fdc88e82c95700d365718e287678c073054f53
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.058472 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 28a5878c9b2c2a32ad9f145daddf5f8f
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.058472 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [232, 114, 200, 163]
2026-02-02T15:31:48.058472 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [40, 165, 135, 140]
2026-02-02T15:31:48.059471 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [40, 165, 135, 140, 155, 44, 42, 50, 173, 159, 20, 93, 173, 223, 95, 143]
2026-02-02T15:31:48.059471 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:48.059471 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.059471 [FINE] [Libp2pRouter] [DEBUG] Disconnected from 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.059471 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:48.059471 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:48.059471 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:48.060472 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:48.060472 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.060472 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:48.060472 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.060472 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.060472 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.060472 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:48.060472 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:48.061471 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:48.061471 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:48.061471 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.061471 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:48.061471 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:48.061471 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:48.061471 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:48.062471 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:48.062471 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:48.062471 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:48.063470 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:48.063470 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:48.063470 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:48.064471 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:48.064471 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 46 bytes: 002c326665341320c4149b8948a7eda4da7e6e711313b206188e9bbf8fb608692a6af4054978755bc1ac56d41259
2026-02-02T15:31:48.064471 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 46 bytes successfully. Data preview (hex): 002c326665341320c4149b8948a7eda4da7e6e71...
2026-02-02T15:31:48.064471 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 2ms
2026-02-02T15:31:48.064471 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:48.064471 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:48.065476 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:48.069475 [FINE] [StreamScopeImpl] stream-1770067907911-6902: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:48.070476 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:48.072474 [FINE] [StreamScopeImpl] stream-1770067907911-6902: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:48.074088 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:48.075014 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA (reported as 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA) on stream 1
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.076536 [FINE] [Libp2pRouter] [DEBUG] Disconnected from 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.076536 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. IsPush: false. Stream ID: 1
2026-02-02T15:31:48.076536 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. IsPush: false. Stream ID: 1
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.076536 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:48.077541 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:48.077541 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
00:55 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.077541 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
00:55 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.077541 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:48.077541 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:48.077541 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should connect to another peer
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.077541 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:48.078542 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:48.078542 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:48.078542 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:48.078542 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.079540 [FINE] [StreamScopeImpl] stream-1770067907911-6902: Setting service to libp2p.identify for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA, protocol /ipfs/id/1.0.0
2026-02-02T15:31:48.080539 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:48.082049 [FINE] [StreamScopeImpl] stream-1770067907911-6902: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:48.082049 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:48.083057 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA: seq=3, protocols=6, addrs=2
2026-02-02T15:31:48.083739 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. Snapshot seq: 3
2026-02-02T15:31:48.087259 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58539 for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.088896 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:48.088896 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:48.089901 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:48.089901 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.089901 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4102, RemoteAddr: /ip4/127.0.0.1/tcp/58539, ViaLoopback: true for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.090406 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:48.090406 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.091410 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:48.094723 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:48.096233 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA
2026-02-02T15:31:48.097237 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:48.098237 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:48.098745 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:48.098745 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58539)
2026-02-02T15:31:48.099788 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. Total message size: 414 bytes. SignedPeerRecord present: true
2026-02-02T15:31:48.099788 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 414).
2026-02-02T15:31:48.100788 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 416 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:48.101293 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 428, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160, 158, 3, 10, 36, 8, 1, 18, 32])
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.101293 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:48.101798 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:48.101798 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:48.101798 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.101798 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.101798 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:48.102813 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:48.102813 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:48.102813 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:48.102813 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.102813 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 444 bytes (plaintext was 428)
2026-02-02T15:31:48.103812 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 446
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.103812 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.103812 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 446 bytes: 01bca38525a30e7e30042bc96ab86e90adccdf606e3f5f369607db36fa98ba36ffc1d09adacbbeaf3159d293ffc62316c1e98ad835f745a3210cf1c7be2e102db367474507e1efa9bd8b9a8ff0a3f84aaac3bf04e54fb17e838320f08ba4a8580fa263fd3200f3e08cfe623976b27dfa2d895598a9b48db61ca76185b2a35b19ceaa5f3964a95a9287b3aba377378c2c4ea791dfb1d5c7995680904a455869f9793ad6d215e6d1652ef3db3b94c732b80824953213c793088d50c962fa115bcb8318c1145063ec3094b013c71cd8853d94048bc93733b81368b306007214d96728d88c922e2bd0ab93319302d1ece580a5c1e1f5828bb225078685960cb7d002c4128ab059a8d736222a16cf5ae04bd1cfd65f4147ecc280bef7d11f7e9eb52284ad6b52944e434547c30923943457e3778e6c11cd7da083b4ccb6ae5f395332570cef1bd49de537d8ebd2e9a38288d17306c211f8a3af253d6c1889c6eb1d82c6c1031e631dcdc0de6e0459af86fbb1043463369553cd83ae1f546dbb35ae06cc9819a51bdd8940c7b94db09d6ec4c6a434631d0b8d090da0c1cfb616025c0d768fc0cc30aeb8a8f451d4a1895c967ab32889a0088df3cb41e906a50cda
2026-02-02T15:31:48.104813 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 446 bytes successfully. Data preview (hex): 01bca38525a30e7e30042bc96ab86e90adccdf60...
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.104813 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.104813 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 416 bytes in 4ms
2026-02-02T15:31:48.104813 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:48.104813 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:48.104813 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.104813 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.105812 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA to 3.
2026-02-02T15:31:48.106317 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.106317 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.106317 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - Initial _network.listenAddresses: []
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.106317 [FINER] [YamuxStream] [0][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:48.107835 [FINER] [YamuxStream] [0][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:48.107835 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:48.107835 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:48.107835 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.108840 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.108840 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - Initial _network.listenAddresses: []
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.109830 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:48.109830 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 30 bytes: 001cdef56f9f6456fd1c9cda5fd509fa54ed99d67b0f20193df3aad3ec13
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.109830 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.110836 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - Initial _network.listenAddresses: []
2026-02-02T15:31:48.111835 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, Host hashCode: 966470068
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.111835 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 46 bytes successfully. Data preview (hex): 002ce872c8a351ef2f01b5fdc88e82c95700d365...
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.111835 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.111835 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.111835 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.111835 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.112835 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:48.112835 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, Host hashCode: 976766385
2026-02-02T15:31:48.113835 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.113835 [FINE] [YamuxStream] [1][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 59ms
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.113835 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.113835 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.113835 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.113835 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.113835 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.113835 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:48.113835 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.113835 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.113835 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.113835 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, Host hashCode: 781531622
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.113835 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:48.113835 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.115351 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.115351 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.115351 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.115351 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.115351 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.115351 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.115351 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.115351 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(84be721b) START. Requested: 2. Buffer: 0 bytes.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.115909 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.115909 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(84be721b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:48.115909 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c326665341320c4149b8948a7eda4da7e6e711313b206188e9bbf8fb608692a6af4054978755bc1ac56d41259
2026-02-02T15:31:48.115909 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(f8935a51) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:48.115909 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(f8935a51) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 326665341320c4149b8948a7eda4da7e6e711313b206188e9bbf8fb608692a6af4054978755bc1ac56d41259
2026-02-02T15:31:48.115909 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:48.115909 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:48.115909 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:48.115909 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:48.115909 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:48.115909 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:48.115909 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:48.115909 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(8ce31e7d) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:48.116921 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(8ce31e7d) END (from buffer). Returning 44 bytes: 326665341320c4149b8948a7eda4da7e6e711313b206188e9bbf8fb608692a6af4054978755bc1ac56d41259. Buffer after: 0 bytes: 
2026-02-02T15:31:48.116921 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [50, 102, 101, 52]
2026-02-02T15:31:48.116921 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.116921 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.116921 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 326665341320c4149b8948a7eda4da7e6e711313b206188e9bbf8fb608692a6af4054978755bc1ac56d41259
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.116921 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.116921 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.116921 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.116921 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:48.116921 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 326665341320c4149b8948a7eda4da7e6e711313b206188e9bbf8fb6
2026-02-02T15:31:48.116921 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 08692a6af4054978755bc1ac56d41259
2026-02-02T15:31:48.116921 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [50, 102, 101, 52]
2026-02-02T15:31:48.117922 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [8, 105, 42, 106]
2026-02-02T15:31:48.117922 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [8, 105, 42, 106, 244, 5, 73, 120, 117, 91, 193, 172, 86, 212, 18, 89]
2026-02-02T15:31:48.118922 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:48.118922 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:48.119921 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:48.119921 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:48.119921 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:48.119921 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:48.119921 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.119921 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:48.119921 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.119921 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.120921 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.120921 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:48.120921 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:48.120921 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:48.120921 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:48.120921 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.120921 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:48.120921 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:48.120921 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:48.120921 [FINE] [YamuxStream] [1][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:18.120921
2026-02-02T15:31:48.122427 [FINE] [StreamScopeImpl] stream-1770067907902-7693: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:48.122427 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:48.122427 [FINE] [StreamScopeImpl] stream-1770067907902-7693: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:48.122427 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:48.123618 [FINE] [StreamScopeImpl] stream-1770067907902-7693: Setting service to libp2p.identify for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, protocol /ipfs/id/1.0.0
2026-02-02T15:31:48.123618 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:48.123618 [FINE] [StreamScopeImpl] stream-1770067907902-7693: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:48.126647 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:48.126647 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 30 bytes successfully. Data preview (hex): 001cdef56f9f6456fd1c9cda5fd509fa54ed99d6...
2026-02-02T15:31:48.126647 [FINE] [YamuxStream] [0][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:48.126647 [FINE] [YamuxStream] [0][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:48.126647 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:48.126647 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA. IsPush: false.
2026-02-02T15:31:48.128309 [FINEST] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - RAW_SOCKET_DATA_CHUNK_RECV (476 bytes): 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
2026-02-02T15:31:48.128309 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:48.128309 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.128309 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.128309 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.129414 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:48.129414 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:48.129414 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:48.129414 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:48.129414 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:48.129414 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(595ae65b) START. Requested: 2. Buffer: 476 bytes.
2026-02-02T15:31:48.129414 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(595ae65b) END (from buffer). Returning 2 bytes: 01bc. Buffer after: 474 bytes: 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
2026-02-02T15:31:48.130464 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 188]
2026-02-02T15:31:48.130464 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:48.130464 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 188]
2026-02-02T15:31:48.130464 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01bc
2026-02-02T15:31:48.130464 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 444
2026-02-02T15:31:48.131042 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 444
2026-02-02T15:31:48.131042 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 444 more bytes (have 0/444)
2026-02-02T15:31:48.131042 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(0132dd2e) START. Requested: 444. Buffer: 474 bytes.
2026-02-02T15:31:48.131042 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(0132dd2e) END (from buffer). Returning 444 bytes: a38525a30e7e30042bc96ab86e90adccdf606e3f5f369607db36fa98ba36ffc1d09adacbbeaf3159d293ffc62316c1e98ad835f745a3210cf1c7be2e102db367474507e1efa9bd8b9a8ff0a3f84aaac3bf04e54fb17e838320f08ba4a8580fa263fd3200f3e08cfe623976b27dfa2d895598a9b48db61ca76185b2a35b19ceaa5f3964a95a9287b3aba377378c2c4ea791dfb1d5c7995680904a455869f9793ad6d215e6d1652ef3db3b94c732b80824953213c793088d50c962fa115bcb8318c1145063ec3094b013c71cd8853d94048bc93733b81368b306007214d96728d88c922e2bd0ab93319302d1ece580a5c1e1f5828bb225078685960cb7d002c4128ab059a8d736222a16cf5ae04bd1cfd65f4147ecc280bef7d11f7e9eb52284ad6b52944e434547c30923943457e3778e6c11cd7da083b4ccb6ae5f395332570cef1bd49de537d8ebd2e9a38288d17306c211f8a3af253d6c1889c6eb1d82c6c1031e631dcdc0de6e0459af86fbb1043463369553cd83ae1f546dbb35ae06cc9819a51bdd8940c7b94db09d6ec4c6a434631d0b8d090da0c1cfb616025c0d768fc0cc30aeb8a8f451d4a1895c967ab32889a0088df3cb41e906a50cda. Buffer after: 30 bytes: 001cdef56f9f6456fd1c9cda5fd509fa54ed99d67b0f20193df3aad3ec13
2026-02-02T15:31:48.131042 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 444 bytes. First 4 bytes: [163, 133, 37, 163]
2026-02-02T15:31:48.131042 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 444, Got: 444
2026-02-02T15:31:48.131042 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 444, Bytes: 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
2026-02-02T15:31:48.131042 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 444
2026-02-02T15:31:48.132047 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(428) and MAC(16)
2026-02-02T15:31:48.132047 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:31:48.132047 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 967ab32889a0088df3cb41e906a50cda
2026-02-02T15:31:48.132047 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [163, 133, 37, 163]
2026-02-02T15:31:48.132553 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [150, 122, 179, 40]
2026-02-02T15:31:48.132553 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [150, 122, 179, 40, 137, 160, 8, 141, 243, 203, 65, 233, 6, 165, 12, 218]
2026-02-02T15:31:48.132553 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:48.132553 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
2026-02-02T15:31:48.133272 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 428 bytes
2026-02-02T15:31:48.133272 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 428 bytes to _decryptedBuffer. New _decryptedBuffer.length: 428
2026-02-02T15:31:48.133272 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 416. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160]
2026-02-02T15:31:48.133272 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:48.133272 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.134787 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=416
2026-02-02T15:31:48.136298 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.138302 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.138302 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.138302 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=416
2026-02-02T15:31:48.138302 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 416, _decryptedBuffer.length: 416
2026-02-02T15:31:48.138302 [FINER] [SecuredConnection] SecuredConnection.read (length=416): Returning 416 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [158, 3, 10, 36, 8, 1, 18, 32, 10, 164, 141, 210, 6, 184, 66, 185, 2, 158, 10, 114]
2026-02-02T15:31:48.138302 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=416
2026-02-02T15:31:48.139301 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.139301 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 416, flags: 0
2026-02-02T15:31:48.139301 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 416 bytes directly to waiting reader
2026-02-02T15:31:48.139301 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 452
2026-02-02T15:31:48.139924 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, 414 bytes, duration=14ms
2026-02-02T15:31:48.143006 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. IsPush: false.
2026-02-02T15:31:48.143006 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 0
2026-02-02T15:31:48.143006 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 6
2026-02-02T15:31:48.144006 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 6
2026-02-02T15:31:48.144006 [FINER] [identify] IdentifyService._diff: Added: 6, Removed: 0
2026-02-02T15:31:48.144006 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Added protocols: 6, Removed protocols: 0
2026-02-02T15:31:48.145134 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: /ip4/127.0.0.1/tcp/58539
2026-02-02T15:31:48.145134 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58539 for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN via conn 0.
2026-02-02T15:31:48.145134 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.146139 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.146139 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (181 bytes).
2026-02-02T15:31:48.146139 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:48.146139 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:48.159064 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:48.159064 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: true
2026-02-02T15:31:48.161064 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:48.161784 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:48.162310 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:48.163820 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.169247 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.170249 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from record public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.170249 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.171246 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Found 2 addresses.
2026-02-02T15:31:48.173754 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:48.194256 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN based on remote connection address /ip4/127.0.0.1/tcp/4102. Before filter: 2
2026-02-02T15:31:48.197257 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4102 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:48.197257 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:48.197257 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:48.197257 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:48.198255 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.198255 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:48.276168 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.281307 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from local peer 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA.
2026-02-02T15:31:48.282814 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.282814 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.282814 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.283818 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches expected remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.288166 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Comparing with received key.
2026-02-02T15:31:48.288166 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches existing key in peerstore.
2026-02-02T15:31:48.289171 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:48.290171 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN in peerstore.
2026-02-02T15:31:48.292195 [FINE] [autonatv2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN identification completed, updating peer map
2026-02-02T15:31:48.293386 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports push.
2026-02-02T15:31:48.293386 [FINER] [YamuxStream] [1][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:48.294390 [FINER] [YamuxStream] [1][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:48.294390 [FINE] [autonatv2] Updating peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:31:48.294896 [FINE] [autonatv2] Adding peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:48.299451 [FINE] [ambient_autonat_v2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports AutoNAT v2, scheduling probe
2026-02-02T15:31:48.327446 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:48.327446 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:48.327446 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:48.328446 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:48.328446 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:48.328446 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 30 bytes: 001cd42c155a9db6d4dc7052ea345c392d78ed89e50f9d970d0498bcc8a2
2026-02-02T15:31:48.328446 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 30 bytes successfully. Data preview (hex): 001cd42c155a9db6d4dc7052ea345c392d78ed89...
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.328446 [FINE] [basichost] Discovered 2 network interfaces
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.329446 [FINE] [YamuxStream] [1][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.329446 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:48.329446 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.329446 [FINE] [YamuxStream] [1][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.329446 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:48.329446 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:48.329446 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:48.330446 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:48.330446 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:48.330446 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:48.330446 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:48.330446 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:48.330446 [INFO] [Config] [Config.newNode] for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: Host created. Listening will be handled by host.start().
2026-02-02T15:31:48.330446 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.330446 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, network.hashCode: 975896545, initial network.listenAddresses: []
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.330446 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, duration=460ms
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.331444 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4502]
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.331444 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.331444 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4502]. Attempting to listen via _network.listen().
2026-02-02T15:31:48.331444 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.331444 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4502] for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.331444 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.331444 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4502 for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.331444 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4502 with transport TCPTransport for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.331444 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4502 with transport TCPTransport
2026-02-02T15:31:48.332445 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:48.332445 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:48.332445 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:48.332445 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:48.332445 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.332445 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.332445 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.332445 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.332445 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.332445 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.332445 [FINE] [basichost] Interface discovery completed. Found 2 addresses
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.332445 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.332445 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.332445 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:48.333444 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [INFO] [Config] [Config.newNode] for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k: Host created. Listening will be handled by host.start().
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(36294944) START. Requested: 2. Buffer: 30 bytes.
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, network.hashCode: 384088039, initial network.listenAddresses: []
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(36294944) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: def56f9f6456fd1c9cda5fd509fa54ed99d67b0f20193df3aad3ec13
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4501]
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4501]. Attempting to listen via _network.listen().
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.333444 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4501]
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.333444 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.334443 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4501] for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.334443 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:48.334443 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.334443 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4501]
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.334443 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:48.334443 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:48.334443 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(48dee6ec) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:48.334443 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(48dee6ec) END (from buffer). Returning 28 bytes: def56f9f6456fd1c9cda5fd509fa54ed99d67b0f20193df3aad3ec13. Buffer after: 0 bytes: 
2026-02-02T15:31:48.334443 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [222, 245, 111, 159]
2026-02-02T15:31:48.337953 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:48.337953 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: def56f9f6456fd1c9cda5fd509fa54ed99d67b0f20193df3aad3ec13
2026-02-02T15:31:48.337953 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:48.337953 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.334443 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4501 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.337953 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: def56f9f6456fd1c9cda5fd5
2026-02-02T15:31:48.337953 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 09fa54ed99d67b0f20193df3aad3ec13
2026-02-02T15:31:48.338953 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [222, 245, 111, 159]
2026-02-02T15:31:48.338953 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [9, 250, 84, 237]
2026-02-02T15:31:48.338953 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [9, 250, 84, 237, 153, 214, 123, 15, 32, 25, 61, 243, 170, 211, 236, 19]
2026-02-02T15:31:48.338953 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.339952 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4501 with transport TCPTransport for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.339952 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063195847): [120, 118, 20, 239, 242, 82, 231, 131, 103, 45, 54, 171, 89, 88, 226, 65, 14, 117, 65, 216, 4, 85, 118, 89, 183, 135, 203, 181, 25, 6, 124, 222]
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.339952 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4501 with transport TCPTransport
2026-02-02T15:31:48.339952 [FINE] [basichost] Discovered 2 network interfaces
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.339952 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [FINER] [basichost] Processing interface: Wi-Fi
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.340953 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:48.340953 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.340953 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.340953 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.340953 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.340953 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:48.340953 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.340953 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.340953 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.340953 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:48.341952 [INFO] [Config] [Config.newNode] for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: Host created. Listening will be handled by host.start().
2026-02-02T15:31:48.341952 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.341952 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, network.hashCode: 864574428, initial network.listenAddresses: []
2026-02-02T15:31:48.342952 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.342952 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4503]. Attempting to listen via _network.listen().
2026-02-02T15:31:48.342952 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.342952 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4503] for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.342952 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.342952 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4503 for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.342952 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4503 with transport TCPTransport for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.342952 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4503 with transport TCPTransport
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.378054 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cd42c155a9db6d4dc7052ea345c392d78ed89e50f9d970d0498bcc8a2
2026-02-02T15:31:48.378054 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(84be721b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:48.378054 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(84be721b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: d42c155a9db6d4dc7052ea345c392d78ed89e50f9d970d0498bcc8a2
2026-02-02T15:31:48.378054 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:48.379054 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:48.379054 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:48.379054 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:48.379054 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:48.379054 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:48.379054 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:48.379054 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(5759dad3) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:48.380053 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(5759dad3) END (from buffer). Returning 28 bytes: d42c155a9db6d4dc7052ea345c392d78ed89e50f9d970d0498bcc8a2. Buffer after: 0 bytes: 
2026-02-02T15:31:48.380053 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [212, 44, 21, 90]
2026-02-02T15:31:48.380053 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:48.380053 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: d42c155a9db6d4dc7052ea345c392d78ed89e50f9d970d0498bcc8a2
2026-02-02T15:31:48.380053 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:48.380053 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:48.380053 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d42c155a9db6d4dc7052ea34
2026-02-02T15:31:48.380053 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5c392d78ed89e50f9d970d0498bcc8a2
2026-02-02T15:31:48.381053 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [212, 44, 21, 90]
2026-02-02T15:31:48.381053 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [92, 57, 45, 120]
2026-02-02T15:31:48.381053 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [92, 57, 45, 120, 237, 137, 229, 15, 157, 151, 13, 4, 152, 188, 200, 162]
2026-02-02T15:31:48.381053 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:48.381053 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:48.381053 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:48.382052 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:48.382052 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:48.382052 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:48.382052 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:48.382753 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:48.382753 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:48.382753 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:48.383259 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:48.383259 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.383259 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.383259 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.383259 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:48.383822 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:48.383822 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:48.383822 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:48.383822 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:48.383822 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a6c604fd) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:48.384384 [FINER] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Read(a6c604fd) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:48.384384 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:48.385388 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:48.385388 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:48.385388 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:48.385388 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:48.385388 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:48.385388 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:48.385388 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:48.385388 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:48.385388 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(c3b8fb19) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:48.386389 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(c3b8fb19) ASYNC WAIT. Requested: 2. Buffer: 0
00:56 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.499719 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4502. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4502 for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.499719 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4502 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4502
2026-02-02T15:31:48.506715 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4502. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4502] for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.506715 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.506715 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4502 for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:48.507717 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.507717 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4502
2026-02-02T15:31:48.507717 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:48.507717 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.507717 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.507717 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.507717 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.507717 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.508716 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.508716 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:48.508716 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.510715 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.510715 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.510715 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.511715 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:31:48.512714 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:31:48.513714 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.516713 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.517714 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.517714 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.519714 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.519714 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.520057 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:31:48.530052 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:48.530052 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.530558 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 975896545, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.533185 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.533185 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, Host hashCode: 976766385
2026-02-02T15:31:48.537211 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.538211 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.538211 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.538211 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.539210 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:31:48.539210 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:31:48.539210 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.539210 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.539210 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.539210 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.554504 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.555983 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.556488 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:31:48.556488 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.559674 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:48.559674 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.559674 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, Host hashCode: 976766385
2026-02-02T15:31:48.559674 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.559674 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.559674 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.559674 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.560856 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:31:48.560856 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:31:48.560856 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.560856 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.560856 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.560856 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.560856 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.561890 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.564416 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:31:48.567419 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.580871 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:48.580871 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:48.580871 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:48.580871 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.580871 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 975896545, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.580871 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.580871 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 975896545, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.581882 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.582387 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.582387 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, Host hashCode: 976766385
2026-02-02T15:31:48.582387 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.582387 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.582387 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.582387 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.582387 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:31:48.582387 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:31:48.582387 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.583855 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.583855 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.583855 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.583855 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.583855 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.583855 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:31:48.583855 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.584855 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.586364 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.587364 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 975896545, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.587364 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:48.587364 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.587364 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 975896545, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.588365 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:48.588365 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.589363 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4502 with ID: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.589363 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:48.589363 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.590364 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:48.590984 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:48.591490 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:48.591490 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.591490 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.591490 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:48.591490 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:48.591490 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.592495 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.592495 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.592869 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.598376 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4501. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4501 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.599378 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4501 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4501
2026-02-02T15:31:48.600379 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4501. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4501] for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.600379 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.601378 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4501 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:48.603378 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.605377 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4501
2026-02-02T15:31:48.605377 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:48.606377 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.607376 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.614376 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.614376 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.614376 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.615375 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.615375 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:48.616376 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.617726 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.617726 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.618271 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.618786 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:31:48.619790 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:31:48.619790 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.620790 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.620790 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.620790 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.621796 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.621796 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.621796 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:31:48.649600 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:48.649600 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.650600 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 384088039, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.678011 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.678011 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, Host hashCode: 966470068
2026-02-02T15:31:48.678011 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.678011 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.683318 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.684823 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.685340 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:31:48.685340 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:31:48.686345 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.686345 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.686345 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.686345 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.687344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.687344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.687344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:31:48.687344 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.687344 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:48.687344 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.688344 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, Host hashCode: 966470068
2026-02-02T15:31:48.688344 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.688344 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.688344 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.688344 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.688344 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:31:48.688344 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:31:48.689343 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.689343 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.689343 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.689343 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.689343 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.689343 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.690344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:31:48.690344 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.691769 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:48.692274 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:48.692274 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:48.692274 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.692274 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 384088039, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.692883 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.692883 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 384088039, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.692883 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.693887 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.693887 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, Host hashCode: 966470068
2026-02-02T15:31:48.693887 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.693887 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.693887 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.693887 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.694887 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:31:48.694887 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:31:48.694887 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.694887 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:31:48.694887 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.695887 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.695887 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.695887 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:31:48.695887 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:31:48.695887 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501] for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.695887 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.696887 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.696887 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 384088039, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.696887 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:48.696887 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.697885 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 384088039, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:31:48.697885 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:48.697885 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.697885 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4501 with ID: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:48.697885 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:48.698886 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.699885 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:48.699885 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:48.700395 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:48.700395 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.701226 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.701226 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:48.701226 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:48.701741 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.702284 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.702284 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.702284 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.703289 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4503. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4503 for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.703289 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4503 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4503
2026-02-02T15:31:48.704289 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4503. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4503] for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.704289 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.704289 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4503 for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:48.704289 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.704289 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4503
2026-02-02T15:31:48.704289 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:48.704289 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.705288 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.705288 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.705288 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.705288 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.706289 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.706289 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:48.711286 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.711286 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.711286 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.711286 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.711286 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:31:48.712286 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:31:48.713285 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.713285 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.713285 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.713285 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.714225 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.714225 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.714225 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:31:48.732644 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:48.732644 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.733148 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 864574428, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.745027 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.745027 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, Host hashCode: 781531622
2026-02-02T15:31:48.749548 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.750544 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.751293 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.751798 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.756199 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:31:48.756199 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:31:48.756892 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.756892 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.756892 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.756892 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.756892 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.756892 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.758411 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:31:48.758411 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.758411 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:48.758411 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.758411 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, Host hashCode: 781531622
2026-02-02T15:31:48.758411 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.758411 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.759415 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.759415 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.761420 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:31:48.761420 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:31:48.761420 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.761420 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.762420 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.762420 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.762420 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.762420 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.763420 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:31:48.763420 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.764420 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:48.764420 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:48.764420 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:48.764420 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.765419 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 864574428, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.765419 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.765419 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 864574428, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.765419 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.766420 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.766420 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, Host hashCode: 781531622
2026-02-02T15:31:48.766420 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.766420 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.766420 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.767418 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.767418 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:31:48.767418 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:31:48.767418 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.769418 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.769418 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.769418 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.769418 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.770418 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.770418 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:31:48.770418 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.770418 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.770418 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.770418 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 864574428, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.770418 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:48.771417 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.771417 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 864574428, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.771417 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:48.771417 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.771417 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4503 with ID: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.771417 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:48.772418 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.772418 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:48.772418 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:48.773416 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:48.773416 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.774416 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:48.774416 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:48.774416 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:48.775416 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.775416 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.775922 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.775922 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.777926 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.778925 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.778925 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.780431 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 187ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.781436 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 191ms (dial: 190ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.782335 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.782335 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.782335 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:48.783560 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:48.783560 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.783986 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.783986 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:48.783986 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.783986 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.789506 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.790507 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.790507 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.790507 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 90ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.792597 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 91ms (dial: 90ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.793984 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.793984 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.794996 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:48.796184 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:48.796184 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.796184 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.796184 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:48.796184 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.797702 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.799577 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.799577 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.799577 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.800591 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 26ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.800591 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 28ms (dial: 27ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.800591 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.800591 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.800591 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:48.802096 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:48.803101 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.803101 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:48.803101 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:48.803101 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.803101 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.804101 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.804101 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.804101 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.805100 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 20ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.805100 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 22ms (dial: 21ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.805100 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.805100 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.805100 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:48.806101 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:48.806101 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:48.806101 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:48.806101 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:48.807098 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.807098 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.807098 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.807098 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.808100 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.808100 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 11ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.809099 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 13ms (dial: 11ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.809099 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.809099 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.809099 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:48.810099 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:48.810099 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:48.810099 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:48.810099 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:48.811098 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.811098 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.811098 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.811098 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.812099 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.812099 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 10ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.812099 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 10ms (dial: 10ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.812099 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.813099 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.813099 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:48.814012 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:48.814012 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:48.814012 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:48.814012 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:48.814518 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.814518 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.814518 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.814518 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.815521 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.815521 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 9ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.816521 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 10ms (dial: 10ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.816521 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.816521 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.817521 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:48.817521 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:48.819520 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:48.819520 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:48.819520 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:48.820520 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.820520 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.820520 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.820520 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.821524 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.821524 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 11ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.821524 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 11ms (dial: 11ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.821524 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.821524 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.821524 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:48.822524 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:48.822524 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:48.822524 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:48.822524 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:48.823523 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.823523 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.823523 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.823523 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.823523 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.824523 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 10ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.824523 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 11ms (dial: 10ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.824523 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.824523 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.824523 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:48.825523 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:48.825523 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:48.826029 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:48.826029 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:48.826029 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.826534 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.826534 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.826534 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.826534 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.826534 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 9ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.828066 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 9ms (dial: 9ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.828066 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.828066 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.828066 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.828066 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.828066 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.829085 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.829085 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 6ms (dial: 6ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.829085 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.829085 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.829085 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:48.829085 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.830084 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.830084 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 4ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.830084 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 4ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      Future.wait.<anonymous closure> (dart:async/future.dart:546:21)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:115:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:48.830084 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:48.843500 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:48.844502 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/broadcast/1.0.0
2026-02-02T15:31:48.844502 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/broadcast/1.0.0
2026-02-02T15:31:48.844502 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4502/p2p/12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.845502 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.845502 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, Host hashCode: 976766385
2026-02-02T15:31:48.845502 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.845502 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.846325 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.846325 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.846325 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:31:48.846830 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:31:48.846830 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:31:48.846830 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:31:48.846830 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.847834 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.847834 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.847834 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:31:48.847834 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:31:48.847834 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:48.847834 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:48.848834 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, Host hashCode: 781531622
2026-02-02T15:31:48.848834 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.848834 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.848834 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.848834 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.848834 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:31:48.848834 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:31:48.849834 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:31:48.849834 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:31:48.849834 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.849834 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.849834 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.850405 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:31:48.850405 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:31:48.850405 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:48.850911 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, existing_conns=0
2026-02-02T15:31:48.850911 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5"
2026-02-02T15:31:48.851915 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5"
2026-02-02T15:31:48.851915 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Dialing.
2026-02-02T15:31:48.854916 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:48.854916 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:31:48.854916 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.854916 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:31:48.854916 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:48.854916 [FINE] [Swarm] Dialing 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:48.855914 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.855914 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:48.855914 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4502 (priority 1)
2026-02-02T15:31:48.855914 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 at /ip4/127.0.0.1/tcp/4502
00:56 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.861913 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:48.861913 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:48.861913 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:48.861913 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:48.862914 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:48.862914 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:48.862914 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:48.862914 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:48.862914 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:48.862914 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:48.862914 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:48.862914 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:56 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should send to multiple peers
00:56 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:48.863911 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:48.863911 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:48.863911 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:48.864911 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:48.864911 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:48.864911 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:48.864911 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:48.864911 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:48.864911 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:48.864911 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:48.866915 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:48.867667 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:48.871191 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:48.871866 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:48.871866 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:48.875877 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:48.876878 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:48.876878 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:48.877878 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:48.879877 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.879877 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc - Initial _network.listenAddresses: []
2026-02-02T15:31:48.879877 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, Host hashCode: 492474711
2026-02-02T15:31:48.889595 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.889595 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:48.890101 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:48.890101 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:48.890101 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:48.891611 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:56 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:48.916734 [FINE] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4502, Socket Remote: 127.0.0.1:58545
2026-02-02T15:31:48.922731 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067908920-3988
2026-02-02T15:31:48.932492 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:48.975485 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(804ff5f0) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:48.975991 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(804ff5f0) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:48.988084 [FINE] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58545, Socket Remote: 127.0.0.1:4502
2026-02-02T15:31:48.989085 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067908989-5467
2026-02-02T15:31:48.990788 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWC8xxQyfMDqEbbGkAPuCsA6Vyqv9wxUoSsQFPtw8AFiiB
2026-02-02T15:31:48.996691 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.004751 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:49.004751 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(292b1f7b) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:49.005746 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(292b1f7b) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:49.013265 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.013265 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(804ff5f0) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.015172 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(804ff5f0) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:49.021188 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.021959 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.021959 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.022472 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:49.022472 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:49.022472 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:49.022472 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(88d1850b) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:49.023486 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(88d1850b) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:49.023486 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.023486 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(292b1f7b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.023486 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(292b1f7b) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:49.023486 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:49.024494 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:49.028092 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(955f8c95) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:49.031946 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(955f8c95) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:49.033468 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:49.033468 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(88d1850b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.033468 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(88d1850b) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:49.033468 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:49.033973 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:49.033973 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:49.034978 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:49.035496 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:49.036501 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:49.037006 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:49.038010 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:49.039027 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:49.064426 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(b3ba6959) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.064426 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(b3ba6959) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.064934 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:49.064934 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(955f8c95) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.064934 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(955f8c95) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:49.070976 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:49.070976 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 34 bytes: 002057a09335143b88595bf5a23e99ab58d5549b32775c2ee6e7f7b4074768ee7421
2026-02-02T15:31:49.072482 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 002057a09335143b88595bf5a23e99ab58d5549b32775c2ee6e7f7b4074768ee7421
2026-02-02T15:31:49.072482 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(b3ba6959) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.072482 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(b3ba6959) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 57a09335143b88595bf5a23e99ab58d5549b32775c2ee6e7f7b4074768ee7421
2026-02-02T15:31:49.072482 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(635cb63a) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:49.072482 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(635cb63a) END (from buffer). Returning 32 bytes: 57a09335143b88595bf5a23e99ab58d5549b32775c2ee6e7f7b4074768ee7421. Buffer after: 0 bytes: 
2026-02-02T15:31:49.072482 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:49.114243 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:49.114243 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 202 bytes: 00c8bcca0d3a57ec5d1db059824b78a0322f22d9f858a3e88f34b51c860a3064f57533a0d52a762ed4f9b45589053861aa195607827ca5ffa92ba8a47823bdc4c59c6c60c02a2b888d1f16e32e07fe814d6ed8141d078a2d6714095c4527f936b4c7e0deb513c340a7d3463cd66fb2dd6e823bd4ae725693604dfc21ba96524b91f658254aabde99a4f1bffe67320e3dad323e47db1dd876bca872522ae88f1a6addb6fd0686ea0bf2728386432357a6d89de073f03383b2ba41e33a6f22d54d8bb39204ce100a992af5
2026-02-02T15:31:49.114749 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 202 bytes successfully. Data preview (hex): 00c8bcca0d3a57ec5d1db059824b78a0322f22d9...
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(48e16751) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(48e16751) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.114749 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 34 bytes successfully. Data preview (hex): 002057a09335143b88595bf5a23e99ab58d5549b...
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(572f07ae) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(572f07ae) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.114749 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c8bcca0d3a57ec5d1db059824b78a0322f22d9f858a3e88f34b51c860a3064f57533a0d52a762ed4f9b45589053861aa195607827ca5ffa92ba8a47823bdc4c59c6c60c02a2b888d1f16e32e07fe814d6ed8141d078a2d6714095c4527f936b4c7e0deb513c340a7d3463cd66fb2dd6e823bd4ae725693604dfc21ba96524b91f658254aabde99a4f1bffe67320e3dad323e47db1dd876bca872522ae88f1a6addb6fd0686ea0bf2728386432357a6d89de073f03383b2ba41e33a6f22d54d8bb39204ce100a992af5
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(572f07ae) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(572f07ae) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: bcca0d3a57ec5d1db059824b78a0322f22d9f858a3e88f34b51c860a3064f57533a0d52a762ed4f9b45589053861aa195607827ca5ffa92ba8a47823bdc4c59c6c60c02a2b888d1f16e32e07fe814d6ed8141d078a2d6714095c4527f936b4c7e0deb513c340a7d3463cd66fb2dd6e823bd4ae725693604dfc21ba96524b91f658254aabde99a4f1bffe67320e3dad323e47db1dd876bca872522ae88f1a6addb6fd0686ea0bf2728386432357a6d89de073f03383b2ba41e33a6f22d54d8bb39204ce100a992af5
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(cd8ea85a) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:31:49.114749 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(cd8ea85a) END (from buffer). Returning 200 bytes: bcca0d3a57ec5d1db059824b78a0322f22d9f858a3e88f34b51c860a3064f57533a0d52a762ed4f9b45589053861aa195607827ca5ffa92ba8a47823bdc4c59c6c60c02a2b888d1f16e32e07fe814d6ed8141d078a2d6714095c4527f936b4c7e0deb513c340a7d3463cd66fb2dd6e823bd4ae725693604dfc21ba96524b91f658254aabde99a4f1bffe67320e3dad323e47db1dd876bca872522ae88f1a6addb6fd0686ea0bf2728386432357a6d89de073f03383b2ba41e33a6f22d54d8bb39204ce100a992af5. Buffer after: 0 bytes: 
2026-02-02T15:31:49.116254 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:31:49.141527 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:49.142574 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 170 bytes: 00a88aaa286d941879e2ccb75a0c2da54b864b01d79c551bf4a0a4d7a1e4edd8d3000e2aee905310332f0eb97fe9348db8075fb4e07caea1cbf904b5570890c29ae605ed6e97707e480ae04efacff698dc150af859256da7ef010e9cd2ab816750a735ab35ec5d7ad12ee66dd0b7d6afa716dbc2e1e2ac186576fcc8365c4155b50a4fd26228abf9eb573cecc2d595e646756e9f40d42e180612123a8f17a6fc8267fc428e9c6f7af6ce
2026-02-02T15:31:49.142574 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 170 bytes successfully. Data preview (hex): 00a88aaa286d941879e2ccb75a0c2da54b864b01...
2026-02-02T15:31:49.142574 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.144814 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:49.144814 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1063596826
2026-02-02T15:31:49.144814 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1058971833
2026-02-02T15:31:49.146329 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.146329 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.147335 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.147850 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:49.147850 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:49.147850 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:49.147850 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 38 bytes: 002471939169999e7d7c4aec9afe4f3e144d7b24e4bc3717b8c3442cc8f0b3aae656eab7cee5
2026-02-02T15:31:49.149095 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (170 bytes): 00a88aaa286d941879e2ccb75a0c2da54b864b01d79c551bf4a0a4d7a1e4edd8d3000e2aee905310332f0eb97fe9348db8075fb4e07caea1cbf904b5570890c29ae605ed6e97707e480ae04efacff698dc150af859256da7ef010e9cd2ab816750a735ab35ec5d7ad12ee66dd0b7d6afa716dbc2e1e2ac186576fcc8365c4155b50a4fd26228abf9eb573cecc2d595e646756e9f40d42e180612123a8f17a6fc8267fc428e9c6f7af6ce
2026-02-02T15:31:49.149095 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(48e16751) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.149095 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(48e16751) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 168 bytes: 8aaa286d941879e2ccb75a0c2da54b864b01d79c551bf4a0a4d7a1e4edd8d3000e2aee905310332f0eb97fe9348db8075fb4e07caea1cbf904b5570890c29ae605ed6e97707e480ae04efacff698dc150af859256da7ef010e9cd2ab816750a735ab35ec5d7ad12ee66dd0b7d6afa716dbc2e1e2ac186576fcc8365c4155b50a4fd26228abf9eb573cecc2d595e646756e9f40d42e180612123a8f17a6fc8267fc428e9c6f7af6ce
2026-02-02T15:31:49.149095 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(6445c7f2) START. Requested: 168. Buffer: 168 bytes.
2026-02-02T15:31:49.149095 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(6445c7f2) END (from buffer). Returning 168 bytes: 8aaa286d941879e2ccb75a0c2da54b864b01d79c551bf4a0a4d7a1e4edd8d3000e2aee905310332f0eb97fe9348db8075fb4e07caea1cbf904b5570890c29ae605ed6e97707e480ae04efacff698dc150af859256da7ef010e9cd2ab816750a735ab35ec5d7ad12ee66dd0b7d6afa716dbc2e1e2ac186576fcc8365c4155b50a4fd26228abf9eb573cecc2d595e646756e9f40d42e180612123a8f17a6fc8267fc428e9c6f7af6ce. Buffer after: 0 bytes: 
2026-02-02T15:31:49.149095 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:49.158505 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.158505 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:49.158505 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1058971833
2026-02-02T15:31:49.158505 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1063596826
2026-02-02T15:31:49.158505 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:49.159505 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.160505 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.160505 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.161505 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.161505 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.161505 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.161505 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.161505 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.164522 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.166525 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.166525 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(63199586) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.166525 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(63199586) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.167409 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 38 bytes successfully. Data preview (hex): 002471939169999e7d7c4aec9afe4f3e144d7b24...
2026-02-02T15:31:49.169413 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.170412 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.170412 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.170412 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.170412 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.171412 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.171412 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.171412 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.171412 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(0b578db4) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.171412 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(0b578db4) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.171412 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 002471939169999e7d7c4aec9afe4f3e144d7b24e4bc3717b8c3442cc8f0b3aae656eab7cee5
2026-02-02T15:31:49.171412 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(63199586) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.171412 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(63199586) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 71939169999e7d7c4aec9afe4f3e144d7b24e4bc3717b8c3442cc8f0b3aae656eab7cee5
2026-02-02T15:31:49.171412 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:49.171412 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.171412 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:49.171412 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:49.171412 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:49.171412 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:49.172916 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:49.172916 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2d4e231b) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:49.172916 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2d4e231b) END (from buffer). Returning 36 bytes: 71939169999e7d7c4aec9afe4f3e144d7b24e4bc3717b8c3442cc8f0b3aae656eab7cee5. Buffer after: 0 bytes: 
2026-02-02T15:31:49.172916 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [113, 147, 145, 105]
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 71939169999e7d7c4aec9afe4f3e144d7b24e4bc3717b8c3442cc8f0b3aae656eab7cee5
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 71939169999e7d7c4aec9afe4f3e144d7b24e4bc
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3717b8c3442cc8f0b3aae656eab7cee5
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [113, 147, 145, 105]
2026-02-02T15:31:49.172916 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [55, 23, 184, 195]
2026-02-02T15:31:49.174434 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [55, 23, 184, 195, 68, 44, 200, 240, 179, 170, 230, 86, 234, 183, 206, 229]
2026-02-02T15:31:49.174952 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.174952 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.175464 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:49.175464 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.175464 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.175464 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.176479 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.176479 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.176479 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.176479 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:49.176479 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:49.176479 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:49.176479 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 38 bytes: 002418665de0e3ce4f106175ef1106e19a7350345405692c4b7d415df7ad55c34362f5c2a7d1
2026-02-02T15:31:49.177478 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 38 bytes successfully. Data preview (hex): 002418665de0e3ce4f106175ef1106e19a735034...
2026-02-02T15:31:49.177478 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:49.177478 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:49.177478 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.177478 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.177478 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.178478 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.178478 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.178478 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.178478 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.178478 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.178478 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(3d005836) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.178478 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(3d005836) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.178478 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 002418665de0e3ce4f106175ef1106e19a7350345405692c4b7d415df7ad55c34362f5c2a7d1
2026-02-02T15:31:49.178478 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(0b578db4) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.178478 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(0b578db4) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 18665de0e3ce4f106175ef1106e19a7350345405692c4b7d415df7ad55c34362f5c2a7d1
2026-02-02T15:31:49.178478 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:49.178478 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.178478 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:49.178478 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:49.179983 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:49.179983 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:49.179983 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:49.179983 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(8de5a78e) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:49.179983 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(8de5a78e) END (from buffer). Returning 36 bytes: 18665de0e3ce4f106175ef1106e19a7350345405692c4b7d415df7ad55c34362f5c2a7d1. Buffer after: 0 bytes: 
2026-02-02T15:31:49.179983 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [24, 102, 93, 224]
2026-02-02T15:31:49.179983 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:49.179983 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 18665de0e3ce4f106175ef1106e19a7350345405692c4b7d415df7ad55c34362f5c2a7d1
2026-02-02T15:31:49.179983 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:49.179983 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:49.179983 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 18665de0e3ce4f106175ef1106e19a7350345405
2026-02-02T15:31:49.180988 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 692c4b7d415df7ad55c34362f5c2a7d1
2026-02-02T15:31:49.180988 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [24, 102, 93, 224]
2026-02-02T15:31:49.180988 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [105, 44, 75, 125]
2026-02-02T15:31:49.180988 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [105, 44, 75, 125, 65, 93, 247, 173, 85, 195, 67, 98, 245, 194, 167, 209]
2026-02-02T15:31:49.180988 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.180988 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.180988 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:49.181988 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.181988 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.181988 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.181988 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.181988 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:49.181988 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:49.181988 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:49.181988 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 32 bytes: 001e0dfd58b6936fbdcde0a08cac2d8ff1b5f02ab36984f6a915f7615607f3fc
2026-02-02T15:31:49.182987 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e0dfd58b6936fbdcde0a08cac2d8ff1b5f02ab36984f6a915f7615607f3fc
2026-02-02T15:31:49.182987 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(3d005836) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.182987 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(3d005836) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 0dfd58b6936fbdcde0a08cac2d8ff1b5f02ab36984f6a915f7615607f3fc
2026-02-02T15:31:49.182987 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:49.182987 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.182987 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:49.182987 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:49.182987 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:49.184208 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:49.184208 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:49.184208 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(98db38b3) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:49.184208 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(98db38b3) END (from buffer). Returning 30 bytes: 0dfd58b6936fbdcde0a08cac2d8ff1b5f02ab36984f6a915f7615607f3fc. Buffer after: 0 bytes: 
2026-02-02T15:31:49.184208 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [13, 253, 88, 182]
2026-02-02T15:31:49.184208 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:49.184208 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 0dfd58b6936fbdcde0a08cac2d8ff1b5f02ab36984f6a915f7615607f3fc
2026-02-02T15:31:49.184208 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:49.184208 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:49.184208 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 0dfd58b6936fbdcde0a08cac2d8f
2026-02-02T15:31:49.185208 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f1b5f02ab36984f6a915f7615607f3fc
2026-02-02T15:31:49.185208 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [13, 253, 88, 182]
2026-02-02T15:31:49.185208 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [241, 181, 240, 42]
2026-02-02T15:31:49.185208 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [241, 181, 240, 42, 179, 105, 132, 246, 169, 21, 247, 97, 86, 7, 243, 252]
2026-02-02T15:31:49.185208 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.185208 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.186209 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:49.186209 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.186209 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.186209 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.186209 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:49.186209 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:49.187208 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:49.187208 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.187208 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:49.187208 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:49.187208 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:49.187208 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 32 bytes: 001e018640d243320537b7f02cb4bce5dd8a9b2f64780642b90b5c2d02ab5827
2026-02-02T15:31:49.188207 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 32 bytes successfully. Data preview (hex): 001e0dfd58b6936fbdcde0a08cac2d8ff1b5f02a...
2026-02-02T15:31:49.188207 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.188207 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.188207 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.188207 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.188207 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.188207 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.189206 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.189206 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.189206 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(23d39327) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.189206 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(23d39327) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.189206 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e018640d243320537b7f02cb4bce5dd8a9b2f64780642b90b5c2d02ab5827
2026-02-02T15:31:49.189206 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(23d39327) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.189206 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(23d39327) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 018640d243320537b7f02cb4bce5dd8a9b2f64780642b90b5c2d02ab5827
2026-02-02T15:31:49.189206 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:49.190205 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.190205 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:49.190205 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:49.190205 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:49.190205 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:49.190205 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:49.190205 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(112e1ea2) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:49.190205 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(112e1ea2) END (from buffer). Returning 30 bytes: 018640d243320537b7f02cb4bce5dd8a9b2f64780642b90b5c2d02ab5827. Buffer after: 0 bytes: 
2026-02-02T15:31:49.190205 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [1, 134, 64, 210]
2026-02-02T15:31:49.190205 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 018640d243320537b7f02cb4bce5dd8a9b2f64780642b90b5c2d02ab5827
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 018640d243320537b7f02cb4bce5
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: dd8a9b2f64780642b90b5c2d02ab5827
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [1, 134, 64, 210]
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [221, 138, 155, 47]
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [221, 138, 155, 47, 100, 120, 6, 66, 185, 11, 92, 45, 2, 171, 88, 39]
2026-02-02T15:31:49.191206 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.191206 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.192205 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:49.192205 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.192205 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.192205 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.199276 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.205782 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 at /ip4/127.0.0.1/tcp/4502
2026-02-02T15:31:49.206557 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4502
2026-02-02T15:31:49.206557 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.208063 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067909208-5467
2026-02-02T15:31:49.210066 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.214773 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:49.216295 [FINE] [SwarmConn] SwarmConn (0): Context set: 4620045f-d27b-4667-a013-cef9b9860fbc
2026-02-02T15:31:49.217329 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: 362ms
2026-02-02T15:31:49.217329 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 32 bytes successfully. Data preview (hex): 001e018640d243320537b7f02cb4bce5dd8a9b2f...
2026-02-02T15:31:49.217329 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:49.218329 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:49.222326 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:49.223325 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:49.226835 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.227835 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067909227-3988
2026-02-02T15:31:49.227835 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.227835 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:49.229834 [FINE] [SwarmConn] SwarmConn (0): Context set: 041e9713-67f0-4145-b9fb-55efae5bb2fb
2026-02-02T15:31:49.229834 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, conn_id=0
2026-02-02T15:31:49.232832 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k": 1
2026-02-02T15:31:49.249283 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:31:49.250287 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.251288 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Conn ID: 0
2026-02-02T15:31:49.251288 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.253286 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.255286 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.257285 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:49.272913 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.273417 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.273417 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.273417 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.273417 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.273417 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.274431 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.274431 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.274431 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.274431 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(8adbf1e1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.274431 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(8adbf1e1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.275471 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.275471 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.275471 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.275471 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.275471 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.276471 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.276471 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.276471 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.276471 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.276471 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(1bbcb8f5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.279554 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(1bbcb8f5) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.281082 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:31:49.281082 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.281082 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Conn ID: 0
2026-02-02T15:31:49.282589 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.282589 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.282589 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:49.287529 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Context HashCode: 697911966
2026-02-02T15:31:49.287529 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:49.287529 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:49.287529 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:49.300751 [FINE] [YamuxStream] [0][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:49.312394 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.312394 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.315051 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:49.316051 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Conn ID: 0
2026-02-02T15:31:49.317051 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.317051 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.317051 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001cc9f74227f1b0971ab91420e29859e19ab819135a83e50fa21033bf10
2026-02-02T15:31:49.317051 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001cc9f74227f1b0971ab91420e29859e19ab819...
2026-02-02T15:31:49.324443 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc9f74227f1b0971ab91420e29859e19ab819135a83e50fa21033bf10
2026-02-02T15:31:49.324443 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(1bbcb8f5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.325447 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(1bbcb8f5) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c9f74227f1b0971ab91420e29859e19ab819135a83e50fa21033bf10
2026-02-02T15:31:49.325447 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.325447 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.325952 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.325952 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.325952 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.325952 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.325952 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.325952 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(f4b0233a) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.326965 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(f4b0233a) END (from buffer). Returning 28 bytes: c9f74227f1b0971ab91420e29859e19ab819135a83e50fa21033bf10. Buffer after: 0 bytes: 
2026-02-02T15:31:49.326965 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [201, 247, 66, 39]
2026-02-02T15:31:49.326965 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.326965 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c9f74227f1b0971ab91420e29859e19ab819135a83e50fa21033bf10
2026-02-02T15:31:49.326965 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.326965 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.326965 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c9f74227f1b0971ab91420e2
2026-02-02T15:31:49.326965 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9859e19ab819135a83e50fa21033bf10
2026-02-02T15:31:49.327964 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [201, 247, 66, 39]
2026-02-02T15:31:49.327964 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [152, 89, 225, 154]
2026-02-02T15:31:49.327964 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [152, 89, 225, 154, 184, 25, 19, 90, 131, 229, 15, 162, 16, 51, 191, 16]
2026-02-02T15:31:49.327964 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.327964 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.328594 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:49.328594 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.330110 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.331128 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.331128 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.342946 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.343945 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:49.343945 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.343945 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.344945 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 30 bytes: 001ce6cf3613268e0dc1a0c4fe5b5e0617081b26ede5b3fe933d9d295efc
2026-02-02T15:31:49.347844 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ce6cf3613268e0dc1a0c4fe5b5e0617081b26ede5b3fe933d9d295efc
2026-02-02T15:31:49.348857 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(8adbf1e1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.348857 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(8adbf1e1) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: e6cf3613268e0dc1a0c4fe5b5e0617081b26ede5b3fe933d9d295efc
2026-02-02T15:31:49.348857 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.348857 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.348857 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.348857 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.349856 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.349856 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.349856 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.349856 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(0fb0a0a2) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.349856 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(0fb0a0a2) END (from buffer). Returning 28 bytes: e6cf3613268e0dc1a0c4fe5b5e0617081b26ede5b3fe933d9d295efc. Buffer after: 0 bytes: 
2026-02-02T15:31:49.349856 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [230, 207, 54, 19]
2026-02-02T15:31:49.349856 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.349856 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e6cf3613268e0dc1a0c4fe5b5e0617081b26ede5b3fe933d9d295efc
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e6cf3613268e0dc1a0c4fe5b
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5e0617081b26ede5b3fe933d9d295efc
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [230, 207, 54, 19]
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [94, 6, 23, 8]
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [94, 6, 23, 8, 27, 38, 237, 229, 179, 254, 147, 61, 157, 41, 94, 252]
2026-02-02T15:31:49.350855 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.350855 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.352361 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:49.352361 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.352361 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.352361 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.352361 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.356378 [FINER] [YamuxStream] [0][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:49.357377 [FINER] [YamuxStream] [0][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:49.357882 [FINE] [YamuxStream] [0][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:49.358469 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:49.358469 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:49.358469 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.358469 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.359473 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001cceaef2a65f0843f2e299c27be4be30b26a71206ea0fb2b01cefa8767
2026-02-02T15:31:49.359473 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001cceaef2a65f0843f2e299c27be4be30b26a71...
2026-02-02T15:31:49.359473 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:49.360473 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:49.363471 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067909361-2290 for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.364795 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:49.365799 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:49.366662 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, stream_id=1, protocol=/ipfs/id/1.0.0, duration=80ms
2026-02-02T15:31:49.367171 [FINE] [YamuxStream] [0][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:19.366662
2026-02-02T15:31:49.370182 [FINE] [YamuxStream] [0][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:49.373095 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.373095 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:49.374098 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:49.374098 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:49.375099 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:49.377616 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:49.377616 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 50 bytes: 0030cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288c73c01b70cec29700a922bb90a5596c9
2026-02-02T15:31:49.381219 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 30 bytes successfully. Data preview (hex): 001ce6cf3613268e0dc1a0c4fe5b5e0617081b26...
2026-02-02T15:31:49.381219 [FINE] [YamuxStream] [1][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:49.382222 [FINER] [YamuxStream] [1][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:49.382222 [FINE] [YamuxStream] [1][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:49.382222 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:49.382222 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:49.382222 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.383222 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.383222 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 30 bytes: 001c7df68a3180bde0b194c88bdd46c8e18803cdae9d46815544cf63e31f
2026-02-02T15:31:49.384222 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.384222 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.384222 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.384222 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.384222 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.384222 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.385729 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.385729 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.386748 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.386748 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(88544e40) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.386748 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(88544e40) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.389007 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (80 bytes): 001cceaef2a65f0843f2e299c27be4be30b26a71206ea0fb2b01cefa87670030cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288c73c01b70cec29700a922bb90a5596c9
2026-02-02T15:31:49.389007 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 50 bytes successfully. Data preview (hex): 0030cbe4fd3bebe6b9f949e0c669b12480c1f25c...
2026-02-02T15:31:49.390516 [FINE] [YamuxStream] [0][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 18ms
2026-02-02T15:31:49.392538 [FINEST] [YamuxStream] [0][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.397865 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c7df68a3180bde0b194c88bdd46c8e18803cdae9d46815544cf63e31f
2026-02-02T15:31:49.397865 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(88544e40) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.397865 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(88544e40) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 7df68a3180bde0b194c88bdd46c8e18803cdae9d46815544cf63e31f
2026-02-02T15:31:49.399383 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.399383 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.399383 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.399383 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.399383 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.399383 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.399383 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.399383 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(ff33ccce) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.399383 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(ff33ccce) END (from buffer). Returning 28 bytes: 7df68a3180bde0b194c88bdd46c8e18803cdae9d46815544cf63e31f. Buffer after: 0 bytes: 
2026-02-02T15:31:49.399383 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [125, 246, 138, 49]
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 7df68a3180bde0b194c88bdd46c8e18803cdae9d46815544cf63e31f
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7df68a3180bde0b194c88bdd
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 46c8e18803cdae9d46815544cf63e31f
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [125, 246, 138, 49]
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [70, 200, 225, 136]
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [70, 200, 225, 136, 3, 205, 174, 157, 70, 129, 85, 68, 207, 99, 227, 31]
2026-02-02T15:31:49.400403 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.400403 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.401908 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:49.402913 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.402913 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:49.402913 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.402913 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.403419 [FINER] [YamuxStream] [0][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:31:49.404158 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 30 bytes successfully. Data preview (hex): 001c7df68a3180bde0b194c88bdd46c8e18803cd...
2026-02-02T15:31:49.404158 [FINER] [YamuxStream] [1][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:49.404812 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k on conn 0
2026-02-02T15:31:49.405331 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067909405-9914 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.406030 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:49.406030 [FINEST] [YamuxStream] [1][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.407047 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.407047 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.407047 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.407047 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.407047 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.407047 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.408047 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.408047 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.408047 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.408047 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(57c019c8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.408047 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(57c019c8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.408047 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.408047 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.408047 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.408047 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.409047 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.409047 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.409047 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.409047 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.409047 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.409047 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(c223533b) START. Requested: 2. Buffer: 80 bytes.
2026-02-02T15:31:49.409047 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(c223533b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: ceaef2a65f0843f2e299c27be4be30b26a71206ea0fb2b01cefa87670030cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288c73c01b70cec29700a922bb90a5596c9
2026-02-02T15:31:49.409047 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.409047 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.409047 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.410047 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.410047 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.410047 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.410047 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.410047 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(680a9f38) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:31:49.410047 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(680a9f38) END (from buffer). Returning 28 bytes: ceaef2a65f0843f2e299c27be4be30b26a71206ea0fb2b01cefa8767. Buffer after: 50 bytes: 0030cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288c73c01b70cec29700a922bb90a5596c9
2026-02-02T15:31:49.410047 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [206, 174, 242, 166]
2026-02-02T15:31:49.410047 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: ceaef2a65f0843f2e299c27be4be30b26a71206ea0fb2b01cefa8767
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ceaef2a65f0843f2e299c27b
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e4be30b26a71206ea0fb2b01cefa8767
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [206, 174, 242, 166]
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [228, 190, 48, 178]
2026-02-02T15:31:49.411046 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [228, 190, 48, 178, 106, 113, 32, 110, 160, 251, 43, 1, 206, 250, 135, 103]
2026-02-02T15:31:49.412045 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.412045 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.412045 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:49.412045 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.413045 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:49.413045 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.413045 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.413045 [FINER] [YamuxStream] [1][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:49.413045 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.413045 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.413045 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.414550 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.414550 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.414550 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.414550 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.414550 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.414550 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.414550 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(32af9cdc) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:49.414550 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(32af9cdc) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288c73c01b70cec29700a922bb90a5596c9
2026-02-02T15:31:49.414550 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:49.414550 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.415554 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:49.415554 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:49.415554 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:49.415554 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:49.415554 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:49.417554 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(f95e6491) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:49.417554 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(f95e6491) END (from buffer). Returning 48 bytes: cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288c73c01b70cec29700a922bb90a5596c9. Buffer after: 0 bytes: 
2026-02-02T15:31:49.417554 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [203, 228, 253, 59]
2026-02-02T15:31:49.417554 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:49.417554 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288c73c01b70cec29700a922bb90a5596c9
2026-02-02T15:31:49.419554 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:49.419554 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:49.419554 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: cbe4fd3bebe6b9f949e0c669b12480c1f25c2de4bf2d9dce636b90797e3ff288
2026-02-02T15:31:49.419554 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c73c01b70cec29700a922bb90a5596c9
2026-02-02T15:31:49.420553 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [203, 228, 253, 59]
2026-02-02T15:31:49.420553 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [199, 60, 1, 183]
2026-02-02T15:31:49.420553 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [199, 60, 1, 183, 12, 236, 41, 112, 10, 146, 43, 185, 10, 85, 150, 201]
2026-02-02T15:31:49.420553 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.420553 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.421553 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:49.421553 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:49.422021 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:49.422021 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.422527 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.422527 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:49.422527 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.423503 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.423503 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.424561 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:49.424561 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:49.424561 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.424561 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:49.425065 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.426078 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:49.428031 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:49.428031 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:49.429054 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.429054 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.429054 [FINE] [YamuxStream] [1][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:49.430053 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:49.430053 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:49.430053 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:49.430053 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:49.430053 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 50 bytes: 003098301fce3f02a73caab919a452a35b919967977f2e5af1c1859ae0cc6af4e0fe623cc15a66a6750d91a8d13eacb666f9
2026-02-02T15:31:49.432052 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.432052 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.432052 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.432052 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.432052 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.433052 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.433052 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.433052 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.433052 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.433052 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(7dc353fc) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.433556 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(7dc353fc) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.433928 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 003098301fce3f02a73caab919a452a35b919967977f2e5af1c1859ae0cc6af4e0fe623cc15a66a6750d91a8d13eacb666f9
2026-02-02T15:31:49.433928 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(57c019c8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.433928 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(57c019c8) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 98301fce3f02a73caab919a452a35b919967977f2e5af1c1859ae0cc6af4e0fe623cc15a66a6750d91a8d13eacb666f9
2026-02-02T15:31:49.433928 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:49.434932 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.434932 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:49.434932 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:49.434932 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:49.436441 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:49.436441 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:49.436946 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(807a22a2) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:49.437951 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(807a22a2) END (from buffer). Returning 48 bytes: 98301fce3f02a73caab919a452a35b919967977f2e5af1c1859ae0cc6af4e0fe623cc15a66a6750d91a8d13eacb666f9. Buffer after: 0 bytes: 
2026-02-02T15:31:49.437951 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [152, 48, 31, 206]
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 98301fce3f02a73caab919a452a35b919967977f2e5af1c1859ae0cc6af4e0fe623cc15a66a6750d91a8d13eacb666f9
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 98301fce3f02a73caab919a452a35b919967977f2e5af1c1859ae0cc6af4e0fe
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 623cc15a66a6750d91a8d13eacb666f9
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [152, 48, 31, 206]
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [98, 60, 193, 90]
2026-02-02T15:31:49.438951 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [98, 60, 193, 90, 102, 166, 117, 13, 145, 168, 209, 62, 172, 182, 102, 249]
2026-02-02T15:31:49.439950 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.439950 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.439950 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:49.439950 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:49.439950 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:49.439950 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.439950 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.440949 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:49.440949 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.440949 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.440949 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.440949 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:49.440949 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:49.440949 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.441949 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:49.441949 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.441949 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:49.441949 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:49.441949 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:49.441949 [FINE] [YamuxStream] [0][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:49.442949 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:49.442949 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:49.442949 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:49.442949 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:49.443949 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 46 bytes: 002cb58f2ffa63bc13c5ab43271b0b2e68c3ffd3c3e073ea9b2e79ec90d0f3b11adef07c3547020a81d8191a583e
2026-02-02T15:31:49.443949 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 46 bytes successfully. Data preview (hex): 002cb58f2ffa63bc13c5ab43271b0b2e68c3ffd3...
2026-02-02T15:31:49.443949 [FINE] [YamuxStream] [0][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:31:49.443949 [FINEST] [YamuxStream] [0][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.444949 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 50 bytes successfully. Data preview (hex): 003098301fce3f02a73caab919a452a35b919967...
2026-02-02T15:31:49.444949 [FINE] [YamuxStream] [1][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 15ms
2026-02-02T15:31:49.444949 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:49.444949 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:49.444949 [FINEST] [YamuxStream] [1][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.446947 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.446947 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.447947 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.447947 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.447947 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.447947 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.447947 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.447947 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.447947 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.447947 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(39e470a5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.447947 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(39e470a5) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.448947 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002cb58f2ffa63bc13c5ab43271b0b2e68c3ffd3c3e073ea9b2e79ec90d0f3b11adef07c3547020a81d8191a583e
2026-02-02T15:31:49.448947 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(7dc353fc) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.448947 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(7dc353fc) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: b58f2ffa63bc13c5ab43271b0b2e68c3ffd3c3e073ea9b2e79ec90d0f3b11adef07c3547020a81d8191a583e
2026-02-02T15:31:49.448947 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:49.449946 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.449946 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:49.449946 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:49.449946 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:49.449946 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:49.449946 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:49.449946 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(cbab0568) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:49.449946 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(cbab0568) END (from buffer). Returning 44 bytes: b58f2ffa63bc13c5ab43271b0b2e68c3ffd3c3e073ea9b2e79ec90d0f3b11adef07c3547020a81d8191a583e. Buffer after: 0 bytes: 
2026-02-02T15:31:49.449946 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [181, 143, 47, 250]
2026-02-02T15:31:49.449946 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:49.450947 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: b58f2ffa63bc13c5ab43271b0b2e68c3ffd3c3e073ea9b2e79ec90d0f3b11adef07c3547020a81d8191a583e
2026-02-02T15:31:49.450947 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:49.450947 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:49.450947 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b58f2ffa63bc13c5ab43271b0b2e68c3ffd3c3e073ea9b2e79ec90d0
2026-02-02T15:31:49.450947 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f3b11adef07c3547020a81d8191a583e
2026-02-02T15:31:49.450947 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [181, 143, 47, 250]
2026-02-02T15:31:49.450947 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [243, 177, 26, 222]
2026-02-02T15:31:49.451584 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [243, 177, 26, 222, 240, 124, 53, 71, 2, 10, 129, 216, 25, 26, 88, 62]
2026-02-02T15:31:49.453600 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.453600 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:49.454601 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:49.454601 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:49.454601 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:49.454601 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.454601 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:49.456106 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.456106 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:49.456106 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:49.456106 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:49.457123 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:49.457123 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:49.457123 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:49.457123 [FINE] [YamuxStream] [1][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:49.458123 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:49.458123 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:49.458123 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:49.458123 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:49.458123 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 46 bytes: 002c4d8ba77e147e9c20bed91b3dee18eee9a04e1408eb754f0269d10e716c74b1d44a23c5b497c7f7f05d4d04ad
2026-02-02T15:31:49.459122 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 46 bytes successfully. Data preview (hex): 002c4d8ba77e147e9c20bed91b3dee18eee9a04e...
2026-02-02T15:31:49.459122 [FINE] [YamuxStream] [1][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:31:49.459122 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:49.459122 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:49.459122 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:49.461335 [FINE] [StreamScopeImpl] stream-1770067909405-9914: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.462339 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:49.513798 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:49.513798 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:49.513798 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:49.513798 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:49.514797 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:49.514797 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:49.514797 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:49.514797 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:49.514797 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:49.514797 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:49.514797 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:49.515796 [INFO] [Config] [Config.newNode] for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc: Host created. Listening will be handled by host.start().
2026-02-02T15:31:49.515796 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:49.515796 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, network.hashCode: 462787195, initial network.listenAddresses: []
2026-02-02T15:31:49.515796 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:49.515796 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4101]. Attempting to listen via _network.listen().
2026-02-02T15:31:49.515796 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:49.515796 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:49.515796 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:31:49.516796 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:49.516796 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4101 with transport TCPTransport for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:49.516796 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4101 with transport TCPTransport
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:49.516796 [FINE] [StreamScopeImpl] stream-1770067909405-9914: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:49.517797 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:49.519011 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k (reported as 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k) on stream 1
2026-02-02T15:31:49.522010 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. IsPush: false. Stream ID: 1
2026-02-02T15:31:49.522010 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. IsPush: false. Stream ID: 1
2026-02-02T15:31:49.522010 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.524011 [FINE] [StreamScopeImpl] stream-1770067909405-9914: Setting service to libp2p.identify for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, protocol /ipfs/id/1.0.0
2026-02-02T15:31:49.524606 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:49.527869 [FINE] [StreamScopeImpl] stream-1770067909405-9914: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:49.527869 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.528375 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k: seq=4, protocols=7, addrs=2
2026-02-02T15:31:49.532751 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Snapshot seq: 4
2026-02-02T15:31:49.536800 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58545 for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.536800 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4502, RemoteAddr: /ip4/127.0.0.1/tcp/58545, ViaLoopback: true for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.536800 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.537805 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.538804 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.540003 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:49.540003 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:49.541003 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.541003 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58545)
2026-02-02T15:31:49.542892 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Total message size: 437 bytes. SignedPeerRecord present: true
2026-02-02T15:31:49.542892 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 437).
2026-02-02T15:31:49.545220 [FINE] [YamuxStream] [1][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 439 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:49.546239 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 451, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183, 181, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:31:49.546239 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:49.546239 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 467 bytes (plaintext was 451)
2026-02-02T15:31:49.546239 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 469
2026-02-02T15:31:49.546239 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 469 bytes: 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
2026-02-02T15:31:49.550248 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.550248 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.550248 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.550248 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.550248 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.550248 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.551248 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.551248 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.551248 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.551248 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(bc4326be) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.551248 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(bc4326be) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.551248 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c4d8ba77e147e9c20bed91b3dee18eee9a04e1408eb754f0269d10e716c74b1d44a23c5b497c7f7f05d4d04ad
2026-02-02T15:31:49.552248 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(39e470a5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.552248 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(39e470a5) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 4d8ba77e147e9c20bed91b3dee18eee9a04e1408eb754f0269d10e716c74b1d44a23c5b497c7f7f05d4d04ad
2026-02-02T15:31:49.552248 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:49.552248 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.552248 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:49.552248 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:49.552248 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:49.552248 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:49.552248 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:49.553248 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(88a68982) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:49.553248 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(88a68982) END (from buffer). Returning 44 bytes: 4d8ba77e147e9c20bed91b3dee18eee9a04e1408eb754f0269d10e716c74b1d44a23c5b497c7f7f05d4d04ad. Buffer after: 0 bytes: 
2026-02-02T15:31:49.553248 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [77, 139, 167, 126]
2026-02-02T15:31:49.553248 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:49.553248 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 4d8ba77e147e9c20bed91b3dee18eee9a04e1408eb754f0269d10e716c74b1d44a23c5b497c7f7f05d4d04ad
2026-02-02T15:31:49.553248 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:49.553248 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:49.553248 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4d8ba77e147e9c20bed91b3dee18eee9a04e1408eb754f0269d10e71
2026-02-02T15:31:49.553248 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 6c74b1d44a23c5b497c7f7f05d4d04ad
2026-02-02T15:31:49.553248 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [77, 139, 167, 126]
2026-02-02T15:31:49.554248 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [108, 116, 177, 212]
2026-02-02T15:31:49.554248 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [108, 116, 177, 212, 74, 35, 197, 180, 151, 199, 247, 240, 93, 77, 4, 173]
2026-02-02T15:31:49.554248 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.554248 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.554248 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:49.555248 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:49.555248 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:49.555248 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.555248 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.555248 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:49.555248 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.555248 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.555248 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.555248 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:49.555248 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:49.556247 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.557246 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:49.557246 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.557246 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:49.559192 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:49.559192 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:49.559698 [FINE] [YamuxStream] [0][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:19.559698
2026-02-02T15:31:49.559698 [FINE] [StreamScopeImpl] stream-1770067909361-2290: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.560713 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:49.561712 [FINE] [StreamScopeImpl] stream-1770067909361-2290: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:49.561712 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:49.564 [FINE] [StreamScopeImpl] stream-1770067909361-2290: Setting service to libp2p.identify for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, protocol /ipfs/id/1.0.0
2026-02-02T15:31:49.565015 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:49.565015 [FINE] [StreamScopeImpl] stream-1770067909361-2290: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:49.567478 [FINEST] [YamuxStream] [0][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.567478 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 469 bytes successfully. Data preview (hex): 01d33c03040014f2357274c964377e12c3f820da...
2026-02-02T15:31:49.567478 [FINE] [YamuxStream] [1][Server] StreamID=1 Direct write: Successfully wrote all 439 bytes in 22ms
2026-02-02T15:31:49.567478 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.568478 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.568478 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.569985 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k to 4.
2026-02-02T15:31:49.569985 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.571227 [FINER] [YamuxStream] [1][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:49.571227 [FINER] [YamuxStream] [1][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:49.571227 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.571227 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:49.571227 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.571227 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.571227 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 30 bytes: 001ce2a5597f5eb889acb4e414c2e81d0de47a25f68ed731ad56f6acc384
2026-02-02T15:31:49.579876 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 30 bytes successfully. Data preview (hex): 001ce2a5597f5eb889acb4e414c2e81d0de47a25...
2026-02-02T15:31:49.579876 [FINE] [YamuxStream] [1][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:49.580892 [FINE] [YamuxStream] [1][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:49.580892 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:49.580892 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. IsPush: false.
2026-02-02T15:31:49.580892 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (469 bytes): 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
2026-02-02T15:31:49.581398 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.581398 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.581398 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.581398 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.581398 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.581398 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.581904 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.581904 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.581904 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.581904 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(5b607921) START. Requested: 2. Buffer: 469 bytes.
2026-02-02T15:31:49.581904 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(5b607921) END (from buffer). Returning 2 bytes: 01d3. Buffer after: 467 bytes: 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
2026-02-02T15:31:49.581904 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 211]
2026-02-02T15:31:49.581904 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.581904 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 211]
2026-02-02T15:31:49.581904 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01d3
2026-02-02T15:31:49.581904 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 467
2026-02-02T15:31:49.581904 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 467
2026-02-02T15:31:49.581904 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 467 more bytes (have 0/467)
2026-02-02T15:31:49.582919 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(4b6d15f0) START. Requested: 467. Buffer: 467 bytes.
2026-02-02T15:31:49.582919 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(4b6d15f0) END (from buffer). Returning 467 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:31:49.582919 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 467 bytes. First 4 bytes: [60, 3, 4, 0]
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 467, Got: 467
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 467, Bytes: 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
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 467
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(451) and MAC(16)
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 47cacbd0e6075b8cb16ef2e2f3be4fee
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [60, 3, 4, 0]
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [71, 202, 203, 208]
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [71, 202, 203, 208, 230, 7, 91, 140, 177, 110, 242, 226, 243, 190, 79, 238]
2026-02-02T15:31:49.582919 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.582919 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.584423 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 451 bytes
2026-02-02T15:31:49.584423 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 451 bytes to _decryptedBuffer. New _decryptedBuffer.length: 451
2026-02-02T15:31:49.584949 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 439. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183]
2026-02-02T15:31:49.584949 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.584949 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.584949 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=439
2026-02-02T15:31:49.584949 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.584949 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.586026 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.586026 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=439
2026-02-02T15:31:49.586026 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 439, _decryptedBuffer.length: 439
2026-02-02T15:31:49.587534 [FINER] [SecuredConnection] SecuredConnection.read (length=439): Returning 439 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [181, 3, 10, 36, 8, 1, 18, 32, 60, 146, 163, 211, 72, 223, 206, 35, 33, 35, 68, 250]
2026-02-02T15:31:49.587534 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=439
2026-02-02T15:31:49.587534 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.587534 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 439, flags: 0
2026-02-02T15:31:49.587534 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 439 bytes directly to waiting reader
2026-02-02T15:31:49.587534 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 475
2026-02-02T15:31:49.588553 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, 437 bytes, duration=21ms
2026-02-02T15:31:49.592877 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. IsPush: false.
2026-02-02T15:31:49.593881 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: 0
2026-02-02T15:31:49.593881 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: 7
2026-02-02T15:31:49.594882 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
2026-02-02T15:31:49.595390 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:31:49.595390 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 - Added protocols: 7, Removed protocols: 0
2026-02-02T15:31:49.595894 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: /ip4/127.0.0.1/tcp/58545
2026-02-02T15:31:49.595894 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58545 for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 via conn 0.
2026-02-02T15:31:49.597407 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.597407 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.597407 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 (181 bytes).
2026-02-02T15:31:49.597407 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:49.598527 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:49.607612 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:49.607612 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: true
2026-02-02T15:31:49.607612 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:49.607612 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:49.607612 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:49.609814 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.609814 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.610813 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 from record public key for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.610813 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.610813 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Found 2 addresses.
2026-02-02T15:31:49.610813 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: 2
2026-02-02T15:31:49.610813 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 based on remote connection address /ip4/127.0.0.1/tcp/4502. Before filter: 2
2026-02-02T15:31:49.611812 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4502 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:49.611812 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:49.611812 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: 2
2026-02-02T15:31:49.611812 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:49.611812 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.611812 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:49.613318 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.614338 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 from local peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.614338 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.614841 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.614841 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 from received public key for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.614841 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 matches expected remote peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.614841 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Comparing with received key.
2026-02-02T15:31:49.614841 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 matches existing key in peerstore.
2026-02-02T15:31:49.614841 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:49.616346 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 in peerstore.
2026-02-02T15:31:49.616346 [FINE] [autonatv2] Peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 identification completed, updating peer map
2026-02-02T15:31:49.617385 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 supports push.
2026-02-02T15:31:49.617385 [FINER] [YamuxStream] [0][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:49.617385 [FINER] [YamuxStream] [0][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:49.617385 [FINE] [autonatv2] Updating peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr, /test/broadcast/1.0.0], connectedness=Connectedness.connected
2026-02-02T15:31:49.618385 [FINE] [autonatv2] Adding peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:49.618385 [FINE] [ambient_autonat_v2] Peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 supports AutoNAT v2, scheduling probe
2026-02-02T15:31:49.618385 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:49.618385 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.618385 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:49.619736 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.619736 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.619736 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001c4d87cbfa2cf105f72bb660efbe546a5b5f0bf8673aa7f223085ddbe8
2026-02-02T15:31:49.619736 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001c4d87cbfa2cf105f72bb660efbe546a5b5f0b...
2026-02-02T15:31:49.619736 [FINE] [YamuxStream] [0][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:49.619736 [FINE] [YamuxStream] [0][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:49.620734 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, duration=337ms
2026-02-02T15:31:49.620734 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:49.620734 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4503/p2p/12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.620734 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, existing_conns=1
2026-02-02T15:31:49.620734 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE"
2026-02-02T15:31:49.622239 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE"
2026-02-02T15:31:49.622239 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Dialing.
2026-02-02T15:31:49.622239 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:49.622239 [FINE] [Swarm] Dialing 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:49.622239 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ce2a5597f5eb889acb4e414c2e81d0de47a25f68ed731ad56f6acc384
2026-02-02T15:31:49.623289 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.623289 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.623289 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.623289 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.623289 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.623289 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.623865 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.623865 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(c98a82f3) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:49.623865 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(c98a82f3) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: e2a5597f5eb889acb4e414c2e81d0de47a25f68ed731ad56f6acc384
2026-02-02T15:31:49.623865 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.623865 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.623865 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(c59555fd) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.623865 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(c59555fd) END (from buffer). Returning 28 bytes: e2a5597f5eb889acb4e414c2e81d0de47a25f68ed731ad56f6acc384. Buffer after: 0 bytes: 
2026-02-02T15:31:49.623865 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [226, 165, 89, 127]
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e2a5597f5eb889acb4e414c2e81d0de47a25f68ed731ad56f6acc384
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.623865 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e2a5597f5eb889acb4e414c2
2026-02-02T15:31:49.625379 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e81d0de47a25f68ed731ad56f6acc384
2026-02-02T15:31:49.625379 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [226, 165, 89, 127]
2026-02-02T15:31:49.625379 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [232, 29, 13, 228]
2026-02-02T15:31:49.625379 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [232, 29, 13, 228, 122, 37, 246, 142, 215, 49, 173, 86, 246, 172, 195, 132]
2026-02-02T15:31:49.625379 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.625379 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:49.625379 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:49.625379 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.626393 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.626393 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.626393 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.626393 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:49.626393 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:49.626393 [FINE] [YamuxStream] [0][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:49.626901 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c4d87cbfa2cf105f72bb660efbe546a5b5f0bf8673aa7f223085ddbe8
2026-02-02T15:31:49.626901 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(bc4326be) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.626901 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(bc4326be) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 4d87cbfa2cf105f72bb660efbe546a5b5f0bf8673aa7f223085ddbe8
2026-02-02T15:31:49.626901 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.626901 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.626901 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.626901 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.626901 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.626901 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.626901 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.626901 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(a2e41a85) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.626901 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(a2e41a85) END (from buffer). Returning 28 bytes: 4d87cbfa2cf105f72bb660efbe546a5b5f0bf8673aa7f223085ddbe8. Buffer after: 0 bytes: 
2026-02-02T15:31:49.626901 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [77, 135, 203, 250]
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 4d87cbfa2cf105f72bb660efbe546a5b5f0bf8673aa7f223085ddbe8
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4d87cbfa2cf105f72bb660ef
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: be546a5b5f0bf8673aa7f223085ddbe8
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [77, 135, 203, 250]
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [190, 84, 106, 91]
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [190, 84, 106, 91, 95, 11, 248, 103, 58, 167, 242, 35, 8, 93, 219, 232]
2026-02-02T15:31:49.627907 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:49.627907 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.627907 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.627907 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.628912 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.628912 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:49.628912 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:49.628912 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:49.628912 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4503 (priority 1)
2026-02-02T15:31:49.628912 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE at /ip4/127.0.0.1/tcp/4503
2026-02-02T15:31:49.630354 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.630354 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.630354 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.630354 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.630860 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.630860 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.630860 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.630860 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(a185d50b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.630860 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(a185d50b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.630860 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.630860 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.630860 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.630860 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.631875 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(0ed23abd) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.631875 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(0ed23abd) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.634401 [FINE] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4503, Socket Remote: 127.0.0.1:58546
2026-02-02T15:31:49.634913 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067909634-6232
2026-02-02T15:31:49.634913 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:49.634913 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(860b1516) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:49.634913 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(860b1516) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:49.640444 [FINE] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58546, Socket Remote: 127.0.0.1:4503
2026-02-02T15:31:49.640948 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067909640-6095
2026-02-02T15:31:49.640948 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWHGer9q8SXzmUMHkn25VX7Fmactk6k2k3pp5se54bqFFc
2026-02-02T15:31:49.640948 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.640948 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:49.641953 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(98c8889c) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:49.641953 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(98c8889c) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:49.641953 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.641953 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(860b1516) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.641953 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(860b1516) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:49.641953 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.641953 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.643235 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.643235 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:49.643235 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:49.643235 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:49.643235 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(b9e39e15) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:49.643235 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(b9e39e15) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:49.643235 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:49.644233 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(98c8889c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.644233 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(98c8889c) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:49.644233 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:49.644233 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:49.644233 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(b9e39e15) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.644737 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(b9e39e15) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:49.644737 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:49.644737 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:49.644737 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:49.644737 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:49.644737 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:49.644737 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(91cd80ea) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:49.644737 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(91cd80ea) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:49.645742 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:49.645742 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(91cd80ea) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.645742 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(91cd80ea) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:49.648326 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:49.648326 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 34 bytes: 0020fa5eecb566a1af9152ea7af05b6007bb9040b805ebe87c25216e9b1c7605121a
2026-02-02T15:31:49.649518 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:49.649518 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:49.649518 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:49.649518 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:49.649518 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:49.654096 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(e6872f8b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.654096 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(e6872f8b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.655612 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 0020fa5eecb566a1af9152ea7af05b6007bb9040b805ebe87c25216e9b1c7605121a
2026-02-02T15:31:49.655612 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(e6872f8b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.655612 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(e6872f8b) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: fa5eecb566a1af9152ea7af05b6007bb9040b805ebe87c25216e9b1c7605121a
2026-02-02T15:31:49.656627 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f9c98067) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:49.656627 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f9c98067) END (from buffer). Returning 32 bytes: fa5eecb566a1af9152ea7af05b6007bb9040b805ebe87c25216e9b1c7605121a. Buffer after: 0 bytes: 
2026-02-02T15:31:49.656627 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:49.671322 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:49.671322 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 202 bytes: 00c8ef614166b61761ea35fe6c0d6183d9455bed0ef2d7371078f1195f9fc30c19433a167e196d7d397a4635b7e7107ba0bcb746202dc1b1e8db7192c8f7ea0489312796ed05fda8b7a1c9ae550118834e2a6ab6c888cf7f0a2a378cb8f2e63383057074688a4b08634591a484f082f39abb5a63e74ad096005a69d2a45e9e3e463883ff401969116209dea7f942ff60c973a2be8d40f77170c05ffe18e2f117d213e3e3e18916fbfb9d6480b77cc3ecf0a65f3c45cee5c85443c8d8a3a64632a08a7e804f5045052b40
2026-02-02T15:31:49.672323 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 202 bytes successfully. Data preview (hex): 00c8ef614166b61761ea35fe6c0d6183d9455bed...
2026-02-02T15:31:49.672323 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(5a5a4c64) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.672828 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(5a5a4c64) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.672828 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 34 bytes successfully. Data preview (hex): 0020fa5eecb566a1af9152ea7af05b6007bb9040...
2026-02-02T15:31:49.672828 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6f628cac) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.672828 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6f628cac) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.673831 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c8ef614166b61761ea35fe6c0d6183d9455bed0ef2d7371078f1195f9fc30c19433a167e196d7d397a4635b7e7107ba0bcb746202dc1b1e8db7192c8f7ea0489312796ed05fda8b7a1c9ae550118834e2a6ab6c888cf7f0a2a378cb8f2e63383057074688a4b08634591a484f082f39abb5a63e74ad096005a69d2a45e9e3e463883ff401969116209dea7f942ff60c973a2be8d40f77170c05ffe18e2f117d213e3e3e18916fbfb9d6480b77cc3ecf0a65f3c45cee5c85443c8d8a3a64632a08a7e804f5045052b40
2026-02-02T15:31:49.673831 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6f628cac) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.673831 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6f628cac) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: ef614166b61761ea35fe6c0d6183d9455bed0ef2d7371078f1195f9fc30c19433a167e196d7d397a4635b7e7107ba0bcb746202dc1b1e8db7192c8f7ea0489312796ed05fda8b7a1c9ae550118834e2a6ab6c888cf7f0a2a378cb8f2e63383057074688a4b08634591a484f082f39abb5a63e74ad096005a69d2a45e9e3e463883ff401969116209dea7f942ff60c973a2be8d40f77170c05ffe18e2f117d213e3e3e18916fbfb9d6480b77cc3ecf0a65f3c45cee5c85443c8d8a3a64632a08a7e804f5045052b40
2026-02-02T15:31:49.673831 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(2ff0925e) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:31:49.673831 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(2ff0925e) END (from buffer). Returning 200 bytes: ef614166b61761ea35fe6c0d6183d9455bed0ef2d7371078f1195f9fc30c19433a167e196d7d397a4635b7e7107ba0bcb746202dc1b1e8db7192c8f7ea0489312796ed05fda8b7a1c9ae550118834e2a6ab6c888cf7f0a2a378cb8f2e63383057074688a4b08634591a484f082f39abb5a63e74ad096005a69d2a45e9e3e463883ff401969116209dea7f942ff60c973a2be8d40f77170c05ffe18e2f117d213e3e3e18916fbfb9d6480b77cc3ecf0a65f3c45cee5c85443c8d8a3a64632a08a7e804f5045052b40. Buffer after: 0 bytes: 
2026-02-02T15:31:49.673831 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:31:49.694049 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:49.694553 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 170 bytes: 00a82efc29528bc82272dfcc75d0c757d1e2b7d3e9281d1653b24742ec72b5314358e5f960313ee481cb8192a80c03fdb0d1610566b2fe86b2a1961bf19fab9a05ccbef9b2a54b4e3fdd21e7241ff7a4c40383b4cd0de5f3731dabb721738c2794e365b53e0c453741bc1865be7748f19d64483a155216f1f9a7b0b91a7aa1775e3aec28f679bbdc8cf2b1e18a3e8b197afa3b3dc99f8907527e9cdd28903b29aa455db5518cc13e738a
2026-02-02T15:31:49.695054 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (170 bytes): 00a82efc29528bc82272dfcc75d0c757d1e2b7d3e9281d1653b24742ec72b5314358e5f960313ee481cb8192a80c03fdb0d1610566b2fe86b2a1961bf19fab9a05ccbef9b2a54b4e3fdd21e7241ff7a4c40383b4cd0de5f3731dabb721738c2794e365b53e0c453741bc1865be7748f19d64483a155216f1f9a7b0b91a7aa1775e3aec28f679bbdc8cf2b1e18a3e8b197afa3b3dc99f8907527e9cdd28903b29aa455db5518cc13e738a
2026-02-02T15:31:49.695054 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(5a5a4c64) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.695054 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(5a5a4c64) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 168 bytes: 2efc29528bc82272dfcc75d0c757d1e2b7d3e9281d1653b24742ec72b5314358e5f960313ee481cb8192a80c03fdb0d1610566b2fe86b2a1961bf19fab9a05ccbef9b2a54b4e3fdd21e7241ff7a4c40383b4cd0de5f3731dabb721738c2794e365b53e0c453741bc1865be7748f19d64483a155216f1f9a7b0b91a7aa1775e3aec28f679bbdc8cf2b1e18a3e8b197afa3b3dc99f8907527e9cdd28903b29aa455db5518cc13e738a
2026-02-02T15:31:49.695054 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(7d075ef5) START. Requested: 168. Buffer: 168 bytes.
2026-02-02T15:31:49.695054 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(7d075ef5) END (from buffer). Returning 168 bytes: 2efc29528bc82272dfcc75d0c757d1e2b7d3e9281d1653b24742ec72b5314358e5f960313ee481cb8192a80c03fdb0d1610566b2fe86b2a1961bf19fab9a05ccbef9b2a54b4e3fdd21e7241ff7a4c40383b4cd0de5f3731dabb721738c2794e365b53e0c453741bc1865be7748f19d64483a155216f1f9a7b0b91a7aa1775e3aec28f679bbdc8cf2b1e18a3e8b197afa3b3dc99f8907527e9cdd28903b29aa455db5518cc13e738a. Buffer after: 0 bytes: 
2026-02-02T15:31:49.695054 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:49.707251 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.707762 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:49.707762 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1058216239
2026-02-02T15:31:49.707762 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1057100261
2026-02-02T15:31:49.707762 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:49.707762 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.707762 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.708988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.708988 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.708988 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.708988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.708988 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.708988 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.709987 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.709987 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.709987 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(afaba97e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.709987 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(afaba97e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.709987 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 170 bytes successfully. Data preview (hex): 00a82efc29528bc82272dfcc75d0c757d1e2b7d3...
2026-02-02T15:31:49.709987 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.709987 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:49.710987 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1057100261
2026-02-02T15:31:49.710987 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1058216239
2026-02-02T15:31:49.710987 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.710987 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.710987 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.710987 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:49.712023 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:49.712023 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:49.712023 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 38 bytes: 0024ea76f0b333163bcdafee5c6a9aa971c766023b278706062d79194b25d275e154b496cd0d
2026-02-02T15:31:49.712023 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024ea76f0b333163bcdafee5c6a9aa971c766023b278706062d79194b25d275e154b496cd0d
2026-02-02T15:31:49.712023 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(afaba97e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.712023 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(afaba97e) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: ea76f0b333163bcdafee5c6a9aa971c766023b278706062d79194b25d275e154b496cd0d
2026-02-02T15:31:49.713527 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:49.713527 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.713527 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:49.713527 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:49.713527 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:49.713527 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:49.713527 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:49.713527 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(d990e7a7) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:49.713527 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(d990e7a7) END (from buffer). Returning 36 bytes: ea76f0b333163bcdafee5c6a9aa971c766023b278706062d79194b25d275e154b496cd0d. Buffer after: 0 bytes: 
2026-02-02T15:31:49.713527 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [234, 118, 240, 179]
2026-02-02T15:31:49.713527 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:49.713527 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: ea76f0b333163bcdafee5c6a9aa971c766023b278706062d79194b25d275e154b496cd0d
2026-02-02T15:31:49.714544 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:49.714544 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:49.714544 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ea76f0b333163bcdafee5c6a9aa971c766023b27
2026-02-02T15:31:49.715048 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8706062d79194b25d275e154b496cd0d
2026-02-02T15:31:49.715048 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [234, 118, 240, 179]
2026-02-02T15:31:49.715988 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [135, 6, 6, 45]
2026-02-02T15:31:49.715988 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [135, 6, 6, 45, 121, 25, 75, 37, 210, 117, 225, 84, 180, 150, 205, 13]
2026-02-02T15:31:49.715988 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.715988 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.716506 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:49.716506 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.716506 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.717020 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.717020 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.717020 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.717020 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.717020 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:49.717020 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:49.717020 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:49.717020 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 38 bytes: 0024ac9abf9ce4f640ecc98adc12e96899400067d88f8e9bb4f92ad150e0f99e7c68fbc234d8
2026-02-02T15:31:49.718251 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 38 bytes successfully. Data preview (hex): 0024ac9abf9ce4f640ecc98adc12e96899400067...
2026-02-02T15:31:49.718251 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:49.718251 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:49.719251 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.719251 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.719251 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.719251 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.719251 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.719251 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.719251 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.719251 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.720251 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(3bae0f66) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.720251 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(3bae0f66) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.720251 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 38 bytes successfully. Data preview (hex): 0024ea76f0b333163bcdafee5c6a9aa971c76602...
2026-02-02T15:31:49.720251 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.720251 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.720251 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.720251 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.720251 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.720251 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.721250 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.721250 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.721250 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(85b9ff34) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.721250 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(85b9ff34) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.721250 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024ac9abf9ce4f640ecc98adc12e96899400067d88f8e9bb4f92ad150e0f99e7c68fbc234d8
2026-02-02T15:31:49.721250 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(85b9ff34) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.721250 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(85b9ff34) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: ac9abf9ce4f640ecc98adc12e96899400067d88f8e9bb4f92ad150e0f99e7c68fbc234d8
2026-02-02T15:31:49.721250 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:49.721250 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.721250 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:49.721250 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:49.722251 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:49.722251 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:49.722251 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:49.722251 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(34e9d516) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:49.722251 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(34e9d516) END (from buffer). Returning 36 bytes: ac9abf9ce4f640ecc98adc12e96899400067d88f8e9bb4f92ad150e0f99e7c68fbc234d8. Buffer after: 0 bytes: 
2026-02-02T15:31:49.722251 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [172, 154, 191, 156]
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: ac9abf9ce4f640ecc98adc12e96899400067d88f8e9bb4f92ad150e0f99e7c68fbc234d8
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ac9abf9ce4f640ecc98adc12e96899400067d88f
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8e9bb4f92ad150e0f99e7c68fbc234d8
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [172, 154, 191, 156]
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [142, 155, 180, 249]
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [142, 155, 180, 249, 42, 209, 80, 224, 249, 158, 124, 104, 251, 194, 52, 216]
2026-02-02T15:31:49.722759 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.722759 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.723764 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:49.723764 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.723764 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.723764 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.723764 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.723764 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:49.723764 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:49.723764 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:49.723764 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 32 bytes: 001e6641c2b9dac42635046df74a7561d8ad31743abf61ee63de3ea0ea0c322f
2026-02-02T15:31:49.723764 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e6641c2b9dac42635046df74a7561d8ad31743abf61ee63de3ea0ea0c322f
2026-02-02T15:31:49.725269 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(3bae0f66) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.725269 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(3bae0f66) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 6641c2b9dac42635046df74a7561d8ad31743abf61ee63de3ea0ea0c322f
2026-02-02T15:31:49.725269 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:49.725269 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.725269 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:49.725269 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:49.725269 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:49.725879 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:49.725879 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:49.725879 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(4e320633) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:49.725879 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(4e320633) END (from buffer). Returning 30 bytes: 6641c2b9dac42635046df74a7561d8ad31743abf61ee63de3ea0ea0c322f. Buffer after: 0 bytes: 
2026-02-02T15:31:49.725879 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [102, 65, 194, 185]
2026-02-02T15:31:49.725879 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:49.725879 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 6641c2b9dac42635046df74a7561d8ad31743abf61ee63de3ea0ea0c322f
2026-02-02T15:31:49.725879 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:49.725879 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:49.725879 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 6641c2b9dac42635046df74a7561
2026-02-02T15:31:49.725879 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: d8ad31743abf61ee63de3ea0ea0c322f
2026-02-02T15:31:49.726885 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [102, 65, 194, 185]
2026-02-02T15:31:49.726885 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [216, 173, 49, 116]
2026-02-02T15:31:49.727401 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [216, 173, 49, 116, 58, 191, 97, 238, 99, 222, 62, 160, 234, 12, 50, 47]
2026-02-02T15:31:49.727401 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.727401 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.727978 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:49.727978 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.727978 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.727978 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.727978 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:49.727978 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:49.727978 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:49.727978 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:49.728503 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:49.728503 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:49.728503 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:49.728503 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 32 bytes: 001e155361d3524450bccc6400536c75146e82c5f90a2924df587267880b023c
2026-02-02T15:31:49.728503 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 32 bytes successfully. Data preview (hex): 001e155361d3524450bccc6400536c75146e82c5...
2026-02-02T15:31:49.728503 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:49.728503 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:49.728503 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:49.728503 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:49.729508 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.729508 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067909729-6232
2026-02-02T15:31:49.730013 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.730013 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:49.730013 [FINE] [SwarmConn] SwarmConn (0): Context set: d9c010ef-f93d-43a6-80ba-5227963b1c36
2026-02-02T15:31:49.730013 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, conn_id=0
2026-02-02T15:31:49.730013 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k": 1
2026-02-02T15:31:49.730555 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:31:49.730555 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.730555 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Conn ID: 0
2026-02-02T15:31:49.730555 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.731134 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.731134 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.731134 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:49.731134 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 32 bytes successfully. Data preview (hex): 001e6641c2b9dac42635046df74a7561d8ad3174...
2026-02-02T15:31:49.731134 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:49.731134 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.732139 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.732139 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.732139 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:49.732139 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:49.732139 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.732139 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.732643 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6d0ed0a3) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.732643 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6d0ed0a3) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.732643 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e155361d3524450bccc6400536c75146e82c5f90a2924df587267880b023c
2026-02-02T15:31:49.732643 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6d0ed0a3) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.732643 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6d0ed0a3) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 155361d3524450bccc6400536c75146e82c5f90a2924df587267880b023c
2026-02-02T15:31:49.732643 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:49.732643 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.732643 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:49.732643 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:49.733646 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:49.733646 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:49.733646 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:49.733646 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6ca1638d) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:49.733646 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(6ca1638d) END (from buffer). Returning 30 bytes: 155361d3524450bccc6400536c75146e82c5f90a2924df587267880b023c. Buffer after: 0 bytes: 
2026-02-02T15:31:49.733646 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [21, 83, 97, 211]
2026-02-02T15:31:49.733646 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:49.733646 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 155361d3524450bccc6400536c75146e82c5f90a2924df587267880b023c
2026-02-02T15:31:49.733646 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:49.734647 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:49.734647 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 155361d3524450bccc6400536c75
2026-02-02T15:31:49.734647 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 146e82c5f90a2924df587267880b023c
2026-02-02T15:31:49.734647 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [21, 83, 97, 211]
2026-02-02T15:31:49.734647 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [20, 110, 130, 197]
2026-02-02T15:31:49.734647 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [20, 110, 130, 197, 249, 10, 41, 36, 223, 88, 114, 103, 136, 11, 2, 60]
2026-02-02T15:31:49.735152 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.735152 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.736668 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:49.736668 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.736668 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:49.737674 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.738178 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.738178 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE at /ip4/127.0.0.1/tcp/4503
2026-02-02T15:31:49.738178 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4503
2026-02-02T15:31:49.738178 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.738178 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067909738-6095
2026-02-02T15:31:49.738178 [FINE] [SwarmConn] SwarmConn (1): Setting up health monitoring for connection to 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.738178 [FINE] [SwarmConn] SwarmConn (1): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:49.738178 [FINE] [SwarmConn] SwarmConn (1): Context set: 8bd234da-dcd2-469e-8efb-73298b2c133c
2026-02-02T15:31:49.738178 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: 115ms
2026-02-02T15:31:49.739682 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.739682 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.739682 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.739682 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.739682 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.739682 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.739682 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.739682 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.739682 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.739682 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(8aaaa0e5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.742685 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(8aaaa0e5) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.743346 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.743346 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.743346 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.743346 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.743346 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.743346 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.743346 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.743346 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.743346 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.743346 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(51336b8d) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.743346 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(51336b8d) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.761037 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Conn ID: 1, Direction: Direction.outbound
2026-02-02T15:31:49.761037 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.761569 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Conn ID: 1
2026-02-02T15:31:49.761569 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.761569 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.761569 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:49.761569 [FINE] [SwarmConn] SwarmConn.newStream (1): Entered to peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Context HashCode: 466048463
2026-02-02T15:31:49.761569 [FINE] [SwarmConn] SwarmConn.newStream (1): Connection is open.
2026-02-02T15:31:49.761569 [FINE] [SwarmConn] SwarmConn.newStream (1): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:49.761569 [FINE] [SwarmConn] SwarmConn.newStream (1): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:49.761569 [FINE] [YamuxStream] [3][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:49.763080 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.763080 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.763080 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:49.763080 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Conn ID: 1
2026-02-02T15:31:49.763652 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.763652 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.763652 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001cb423e88ac4418eb6b79070552b65bd6500e6495dbea2a8a3c9c3f947
2026-02-02T15:31:49.763652 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cb423e88ac4418eb6b79070552b65bd6500e6495dbea2a8a3c9c3f947
2026-02-02T15:31:49.763652 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(8aaaa0e5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.763652 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(8aaaa0e5) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: b423e88ac4418eb6b79070552b65bd6500e6495dbea2a8a3c9c3f947
2026-02-02T15:31:49.763652 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.765158 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.765158 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f61101fb) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.765158 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f61101fb) END (from buffer). Returning 28 bytes: b423e88ac4418eb6b79070552b65bd6500e6495dbea2a8a3c9c3f947. Buffer after: 0 bytes: 
2026-02-02T15:31:49.765158 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [180, 35, 232, 138]
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b423e88ac4418eb6b79070552b65bd6500e6495dbea2a8a3c9c3f947
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b423e88ac4418eb6b7907055
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2b65bd6500e6495dbea2a8a3c9c3f947
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [180, 35, 232, 138]
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [43, 101, 189, 101]
2026-02-02T15:31:49.765158 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [43, 101, 189, 101, 0, 230, 73, 93, 190, 162, 168, 163, 201, 195, 249, 71]
2026-02-02T15:31:49.765158 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.766678 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.766678 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:49.766678 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.766678 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.766678 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.766678 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.767718 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.767718 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:49.767718 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.767718 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.767718 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 30 bytes: 001c49800f95f5db494012d5fd80da62196c90c446ba6e436012a45d6210
2026-02-02T15:31:49.767718 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001cb423e88ac4418eb6b79070552b65bd6500e6...
2026-02-02T15:31:49.769717 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c49800f95f5db494012d5fd80da62196c90c446ba6e436012a45d6210
2026-02-02T15:31:49.769717 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(51336b8d) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.769717 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(51336b8d) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 49800f95f5db494012d5fd80da62196c90c446ba6e436012a45d6210
2026-02-02T15:31:49.770717 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.770717 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.770717 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.770717 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.770717 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.770717 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.770717 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.770717 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(045721dd) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.770717 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(045721dd) END (from buffer). Returning 28 bytes: 49800f95f5db494012d5fd80da62196c90c446ba6e436012a45d6210. Buffer after: 0 bytes: 
2026-02-02T15:31:49.770717 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [73, 128, 15, 149]
2026-02-02T15:31:49.770717 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.770717 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 49800f95f5db494012d5fd80da62196c90c446ba6e436012a45d6210
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 49800f95f5db494012d5fd80
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: da62196c90c446ba6e436012a45d6210
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [73, 128, 15, 149]
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [218, 98, 25, 108]
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [218, 98, 25, 108, 144, 196, 70, 186, 110, 67, 96, 18, 164, 93, 98, 16]
2026-02-02T15:31:49.772223 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.772223 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.773241 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:49.773241 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.773241 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.773241 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.773241 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.773241 [FINER] [YamuxStream] [3][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:49.773241 [FINER] [YamuxStream] [3][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:49.773241 [FINE] [YamuxStream] [3][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:49.774241 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:49.774241 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:49.774241 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.774241 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.774241 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001cde6e34149b272cbcb25cbbdb0c2d9a9578f42c8f06e4445df14a6ca4
2026-02-02T15:31:49.774241 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001cde6e34149b272cbcb25cbbdb0c2d9a9578f4...
2026-02-02T15:31:49.775240 [FINE] [SwarmConn] SwarmConn.newStream (1): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:49.775240 [FINE] [SwarmConn] SwarmConn.newStream (1): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:49.775240 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067909775-7681 for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.775240 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:49.775745 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:49.775745 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, stream_id=1, protocol=/ipfs/id/1.0.0, duration=14ms
2026-02-02T15:31:49.775745 [FINE] [YamuxStream] [3][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:19.775745
2026-02-02T15:31:49.775745 [FINE] [YamuxStream] [3][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:49.776261 [INFO] [SwarmConn] SwarmConn (1): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.776261 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE (1): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:49.776261 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:49.776261 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:49.776261 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:49.776261 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:49.776261 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 50 bytes: 00305bea6baaf7fcfcd35996ed31af30486c9e223ad6e8fbb0269702748f2b685127a472d11958cab61b7755e0eaf5738dc3
2026-02-02T15:31:49.777264 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 50 bytes successfully. Data preview (hex): 00305bea6baaf7fcfcd35996ed31af30486c9e22...
2026-02-02T15:31:49.777264 [FINE] [YamuxStream] [3][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:49.777264 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.777870 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 30 bytes successfully. Data preview (hex): 001c49800f95f5db494012d5fd80da62196c90c4...
2026-02-02T15:31:49.777870 [FINE] [YamuxStream] [2][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:49.777870 [FINER] [YamuxStream] [2][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:49.777870 [FINE] [YamuxStream] [2][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:49.777870 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:49.778387 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:49.778387 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.778387 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.778902 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 30 bytes: 001ccaae92c4e147dceb260fe08c729cca317be58474cec909c727e41a68
2026-02-02T15:31:49.779343 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 30 bytes successfully. Data preview (hex): 001ccaae92c4e147dceb260fe08c729cca317be5...
2026-02-02T15:31:49.779343 [FINER] [YamuxStream] [2][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:49.779343 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k on conn 0
2026-02-02T15:31:49.779848 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067909779-9914 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.780276 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:49.780276 [FINEST] [YamuxStream] [2][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.780276 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.780780 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.780780 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.780780 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.780780 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.780780 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.780780 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.780780 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.781208 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.781208 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(afb50b03) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.781208 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(afb50b03) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.781208 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cde6e34149b272cbcb25cbbdb0c2d9a9578f42c8f06e4445df14a6ca4
2026-02-02T15:31:49.781208 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ccaae92c4e147dceb260fe08c729cca317be58474cec909c727e41a68
2026-02-02T15:31:49.781712 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(afb50b03) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.781712 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(afb50b03) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: caae92c4e147dceb260fe08c729cca317be58474cec909c727e41a68
2026-02-02T15:31:49.781712 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.781712 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.781712 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.781712 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.781712 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.781712 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.782225 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.782225 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(f9eff3ed) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.782225 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(f9eff3ed) END (from buffer). Returning 28 bytes: caae92c4e147dceb260fe08c729cca317be58474cec909c727e41a68. Buffer after: 0 bytes: 
2026-02-02T15:31:49.782225 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [202, 174, 146, 196]
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: caae92c4e147dceb260fe08c729cca317be58474cec909c727e41a68
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: caae92c4e147dceb260fe08c
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 729cca317be58474cec909c727e41a68
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [202, 174, 146, 196]
2026-02-02T15:31:49.782225 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [114, 156, 202, 49]
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [114, 156, 202, 49, 123, 229, 132, 116, 206, 201, 9, 199, 39, 228, 26, 104]
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.783234 [FINER] [YamuxStream] [3][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.783234 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(364b764b) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:49.783234 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(364b764b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: de6e34149b272cbcb25cbbdb0c2d9a9578f42c8f06e4445df14a6ca4
2026-02-02T15:31:49.783234 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.783234 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.784741 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.784741 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(0c36cd8b) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.784741 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(0c36cd8b) END (from buffer). Returning 28 bytes: de6e34149b272cbcb25cbbdb0c2d9a9578f42c8f06e4445df14a6ca4. Buffer after: 0 bytes: 
2026-02-02T15:31:49.784741 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [222, 110, 52, 20]
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: de6e34149b272cbcb25cbbdb0c2d9a9578f42c8f06e4445df14a6ca4
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: de6e34149b272cbcb25cbbdb
2026-02-02T15:31:49.784741 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 0c2d9a9578f42c8f06e4445df14a6ca4
2026-02-02T15:31:49.785259 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [222, 110, 52, 20]
2026-02-02T15:31:49.785259 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [12, 45, 154, 149]
2026-02-02T15:31:49.785259 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [12, 45, 154, 149, 120, 244, 44, 143, 6, 228, 68, 93, 241, 74, 108, 164]
2026-02-02T15:31:49.785259 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.785259 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.786272 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:49.786272 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.786272 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:49.786272 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.786272 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.786272 [FINER] [YamuxStream] [2][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:49.786272 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00305bea6baaf7fcfcd35996ed31af30486c9e223ad6e8fbb0269702748f2b685127a472d11958cab61b7755e0eaf5738dc3
2026-02-02T15:31:49.786272 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.786272 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.786272 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.787777 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.787777 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.787777 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.787777 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(645267a5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.787777 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(645267a5) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.787777 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.787777 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.788797 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.788797 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.788797 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.788797 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(975e9f33) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:49.788797 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(975e9f33) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 5bea6baaf7fcfcd35996ed31af30486c9e223ad6e8fbb0269702748f2b685127a472d11958cab61b7755e0eaf5738dc3
2026-02-02T15:31:49.788797 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:49.788797 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.788797 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:49.788797 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:49.788797 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:49.788797 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:49.788797 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:49.788797 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(b164f30a) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:49.788797 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(b164f30a) END (from buffer). Returning 48 bytes: 5bea6baaf7fcfcd35996ed31af30486c9e223ad6e8fbb0269702748f2b685127a472d11958cab61b7755e0eaf5738dc3. Buffer after: 0 bytes: 
2026-02-02T15:31:49.789797 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [91, 234, 107, 170]
2026-02-02T15:31:49.789797 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:49.789797 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 5bea6baaf7fcfcd35996ed31af30486c9e223ad6e8fbb0269702748f2b685127a472d11958cab61b7755e0eaf5738dc3
2026-02-02T15:31:49.789797 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:49.789797 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:49.789797 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5bea6baaf7fcfcd35996ed31af30486c9e223ad6e8fbb0269702748f2b685127
2026-02-02T15:31:49.789797 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a472d11958cab61b7755e0eaf5738dc3
2026-02-02T15:31:49.789797 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [91, 234, 107, 170]
2026-02-02T15:31:49.790301 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [164, 114, 209, 25]
2026-02-02T15:31:49.790301 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [164, 114, 209, 25, 88, 202, 182, 27, 119, 85, 224, 234, 245, 115, 141, 195]
2026-02-02T15:31:49.790301 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.790301 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:49.790760 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:49.790760 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.790760 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:49.790760 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:49.792331 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.792331 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:49.792331 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.792331 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:49.792331 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:49.792331 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:49.792331 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.792331 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:49.792331 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:49.793341 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:49.793341 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:49.793341 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:49.794341 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:49.794341 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 50 bytes: 00306902c6d2ae216e65d698414b03cd9684d18a3552f634e66c58d1989e9e349e49dc2b717576a88e401b7fe3492cbf94b6
2026-02-02T15:31:49.794846 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 50 bytes successfully. Data preview (hex): 00306902c6d2ae216e65d698414b03cd9684d18a...
2026-02-02T15:31:49.794846 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 2ms
2026-02-02T15:31:49.794846 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:49.794846 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:49.794846 [FINEST] [YamuxStream] [2][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.794846 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.794846 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.794846 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.800880 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.800880 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.800880 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.814221 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.814221 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.814221 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.814754 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(264fdda1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.814754 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(264fdda1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.814754 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00306902c6d2ae216e65d698414b03cd9684d18a3552f634e66c58d1989e9e349e49dc2b717576a88e401b7fe3492cbf94b6
2026-02-02T15:31:49.814754 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(645267a5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.815765 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(645267a5) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 6902c6d2ae216e65d698414b03cd9684d18a3552f634e66c58d1989e9e349e49dc2b717576a88e401b7fe3492cbf94b6
2026-02-02T15:31:49.815765 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:49.815765 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:49.816764 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:49.816764 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(c00d202d) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:49.816764 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(c00d202d) END (from buffer). Returning 48 bytes: 6902c6d2ae216e65d698414b03cd9684d18a3552f634e66c58d1989e9e349e49dc2b717576a88e401b7fe3492cbf94b6. Buffer after: 0 bytes: 
2026-02-02T15:31:49.816764 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [105, 2, 198, 210]
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 6902c6d2ae216e65d698414b03cd9684d18a3552f634e66c58d1989e9e349e49dc2b717576a88e401b7fe3492cbf94b6
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 6902c6d2ae216e65d698414b03cd9684d18a3552f634e66c58d1989e9e349e49
2026-02-02T15:31:49.816764 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: dc2b717576a88e401b7fe3492cbf94b6
2026-02-02T15:31:49.817765 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [105, 2, 198, 210]
2026-02-02T15:31:49.817765 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [220, 43, 113, 117]
2026-02-02T15:31:49.817765 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [220, 43, 113, 117, 118, 168, 142, 64, 27, 127, 227, 73, 44, 191, 148, 182]
2026-02-02T15:31:49.817765 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.817765 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.817765 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:49.821764 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:49.821764 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:49.821764 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.821764 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.822762 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:49.822762 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.822762 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.822762 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.822762 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:49.822762 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:49.822762 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.822762 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:49.822762 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.822762 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:49.822762 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:49.822762 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:49.822762 [FINE] [YamuxStream] [3][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:49.822762 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:49.824267 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:49.824267 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:49.824267 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:49.824267 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 46 bytes: 002ca9ad4c2491facce780c2abdf4ffc2c10173a0336a96d8d69afe940f85d4758ada8b89d4bbe30d8fc9a947c6e
2026-02-02T15:31:49.824267 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 46 bytes successfully. Data preview (hex): 002ca9ad4c2491facce780c2abdf4ffc2c10173a...
2026-02-02T15:31:49.824267 [FINE] [YamuxStream] [3][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:31:49.825312 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.825312 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.825312 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.825312 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.825312 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.825312 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.825312 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.825312 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.825312 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.825312 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.825312 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(d912ca2e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.826312 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(d912ca2e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.826312 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002ca9ad4c2491facce780c2abdf4ffc2c10173a0336a96d8d69afe940f85d4758ada8b89d4bbe30d8fc9a947c6e
2026-02-02T15:31:49.826312 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(264fdda1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.826312 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(264fdda1) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: a9ad4c2491facce780c2abdf4ffc2c10173a0336a96d8d69afe940f85d4758ada8b89d4bbe30d8fc9a947c6e
2026-02-02T15:31:49.826312 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:49.826312 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.826312 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:49.826312 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:49.826312 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:49.826312 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:49.826312 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:49.826312 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(a581eb17) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:49.827312 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(a581eb17) END (from buffer). Returning 44 bytes: a9ad4c2491facce780c2abdf4ffc2c10173a0336a96d8d69afe940f85d4758ada8b89d4bbe30d8fc9a947c6e. Buffer after: 0 bytes: 
2026-02-02T15:31:49.827312 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [169, 173, 76, 36]
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: a9ad4c2491facce780c2abdf4ffc2c10173a0336a96d8d69afe940f85d4758ada8b89d4bbe30d8fc9a947c6e
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a9ad4c2491facce780c2abdf4ffc2c10173a0336a96d8d69afe940f8
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5d4758ada8b89d4bbe30d8fc9a947c6e
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [169, 173, 76, 36]
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [93, 71, 88, 173]
2026-02-02T15:31:49.827312 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [93, 71, 88, 173, 168, 184, 157, 75, 190, 48, 216, 252, 154, 148, 124, 110]
2026-02-02T15:31:49.827312 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.828313 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.828313 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:49.828313 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:49.828313 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:49.828313 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.828313 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.828313 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:49.828313 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.828313 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.829311 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.829311 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:49.829311 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:49.830311 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.830311 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:49.830311 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.830311 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:49.830311 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:49.830311 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:49.830311 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:49.830311 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:49.830311 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:49.831311 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:49.831311 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:49.831311 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:49.831311 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:49.831311 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:49.831311 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 46 bytes: 002c02cfb660b9f9e16e894ee509a5c656a144632dbf4552eb26a26fa49c3a922d2134c36d05dee3c0efb04603de
2026-02-02T15:31:49.832311 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 46 bytes successfully. Data preview (hex): 002c02cfb660b9f9e16e894ee509a5c656a14463...
2026-02-02T15:31:49.832311 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:31:49.832311 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:49.832311 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:49.832311 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:49.832311 [FINE] [StreamScopeImpl] stream-1770067909779-9914: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.832311 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:49.832311 [FINE] [StreamScopeImpl] stream-1770067909779-9914: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:49.832311 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:49.833311 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k (reported as 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k) on stream 1
2026-02-02T15:31:49.833311 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. IsPush: false. Stream ID: 1
2026-02-02T15:31:49.833311 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. IsPush: false. Stream ID: 1
2026-02-02T15:31:49.833311 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.833311 [FINE] [StreamScopeImpl] stream-1770067909779-9914: Setting service to libp2p.identify for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, protocol /ipfs/id/1.0.0
2026-02-02T15:31:49.833311 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:49.833311 [FINE] [StreamScopeImpl] stream-1770067909779-9914: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:49.833311 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.834310 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k: seq=4, protocols=7, addrs=2
2026-02-02T15:31:49.834310 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Snapshot seq: 4
2026-02-02T15:31:49.834310 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58546 for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.834310 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4503, RemoteAddr: /ip4/127.0.0.1/tcp/58546, ViaLoopback: true for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.834310 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.835311 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.835311 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:49.835311 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:49.835311 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:49.835311 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.835311 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58546)
2026-02-02T15:31:49.835311 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Total message size: 437 bytes. SignedPeerRecord present: true
2026-02-02T15:31:49.835311 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 437).
2026-02-02T15:31:49.836816 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 439 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:49.836816 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 451, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183, 181, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:31:49.837822 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:49.837822 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 467 bytes (plaintext was 451)
2026-02-02T15:31:49.837822 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 469
2026-02-02T15:31:49.837822 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 469 bytes: 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
2026-02-02T15:31:49.838821 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 469 bytes successfully. Data preview (hex): 01d35111c6ddb33492fd247a1d61c866b59450a3...
2026-02-02T15:31:49.838821 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 439 bytes in 2ms
2026-02-02T15:31:49.838821 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.839386 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.839386 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.839386 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k to 4.
2026-02-02T15:31:49.839386 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.839386 [FINER] [YamuxStream] [2][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:49.839386 [FINER] [YamuxStream] [2][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:49.839386 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.839386 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:49.840390 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.840390 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.840390 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 30 bytes: 001c41262f184c0c4d66397c41a8c67dba5a35f1cf5d673d0fcd8da2f7ae
2026-02-02T15:31:49.840390 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.840390 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.840390 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.840390 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.840390 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.840390 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.840390 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.840390 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.841389 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.841389 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(895bd977) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.841389 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(895bd977) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.841389 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c02cfb660b9f9e16e894ee509a5c656a144632dbf4552eb26a26fa49c3a922d2134c36d05dee3c0efb04603de
2026-02-02T15:31:49.841389 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(d912ca2e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.841389 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(d912ca2e) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 02cfb660b9f9e16e894ee509a5c656a144632dbf4552eb26a26fa49c3a922d2134c36d05dee3c0efb04603de
2026-02-02T15:31:49.841389 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:49.841389 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.841389 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:49.841389 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:49.841389 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:49.841389 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:49.841389 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:49.842389 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(e943d417) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:49.842389 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(e943d417) END (from buffer). Returning 44 bytes: 02cfb660b9f9e16e894ee509a5c656a144632dbf4552eb26a26fa49c3a922d2134c36d05dee3c0efb04603de. Buffer after: 0 bytes: 
2026-02-02T15:31:49.842389 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [2, 207, 182, 96]
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 02cfb660b9f9e16e894ee509a5c656a144632dbf4552eb26a26fa49c3a922d2134c36d05dee3c0efb04603de
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 02cfb660b9f9e16e894ee509a5c656a144632dbf4552eb26a26fa49c
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3a922d2134c36d05dee3c0efb04603de
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [2, 207, 182, 96]
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [58, 146, 45, 33]
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [58, 146, 45, 33, 52, 195, 109, 5, 222, 227, 192, 239, 176, 70, 3, 222]
2026-02-02T15:31:49.842389 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.842389 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:49.843389 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:49.843389 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:49.843389 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:49.843389 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:49.843389 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:49.844388 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.844388 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:49.844388 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:49.844388 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:49.844388 [FINE] [YamuxStream] [3][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:19.844388
2026-02-02T15:31:49.844388 [FINE] [StreamScopeImpl] stream-1770067909775-7681: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.844388 [FINE] [StreamScopeImpl] stream-1770067909775-7681: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:49.845389 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:49.845389 [FINE] [StreamScopeImpl] stream-1770067909775-7681: Setting service to libp2p.identify for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, protocol /ipfs/id/1.0.0
2026-02-02T15:31:49.845389 [FINE] [StreamScopeImpl] stream-1770067909775-7681: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:49.845389 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:49.845389 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 30 bytes successfully. Data preview (hex): 001c41262f184c0c4d66397c41a8c67dba5a35f1...
2026-02-02T15:31:49.845389 [FINE] [YamuxStream] [2][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:49.846388 [FINE] [YamuxStream] [2][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:49.846388 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:49.846388 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k. IsPush: false.
2026-02-02T15:31:49.846388 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (499 bytes): 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
2026-02-02T15:31:49.846388 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.846388 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.846388 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.846388 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.846388 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.846388 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.847388 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.847388 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.847388 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.847388 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(a43ac777) START. Requested: 2. Buffer: 499 bytes.
2026-02-02T15:31:49.847388 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(a43ac777) END (from buffer). Returning 2 bytes: 01d3. Buffer after: 497 bytes: 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
2026-02-02T15:31:49.847388 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 211]
2026-02-02T15:31:49.847388 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.847388 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 211]
2026-02-02T15:31:49.847388 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01d3
2026-02-02T15:31:49.847388 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 467
2026-02-02T15:31:49.847388 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 467
2026-02-02T15:31:49.847388 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 467 more bytes (have 0/467)
2026-02-02T15:31:49.847388 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(0a2a37ad) START. Requested: 467. Buffer: 497 bytes.
2026-02-02T15:31:49.847388 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(0a2a37ad) END (from buffer). Returning 467 bytes: 5111c6ddb33492fd247a1d61c866b59450a3d619fc8820370f3ada253dc1f65a7f73db5016e7dbc7513a68fc1b4618e55d1da6f0653248f336ddbaa4e98c9d5567e592b43c85e15e598d5512f07a216780037f79387640781a0cb6504410d219b9a7dddbb1763f7ce262a60d88f9798dea8074a3e5d1891fe1c645d684c6bac0488afca662bb179b2f49dfd016b7bd7b289e5eed3224980e814686fa5d118ccc7bbceffce7301f4828ef6dce84ca5be463222b51ae64949216109d514f7e729a78be9227c622365300b0e548b2255279853ef56c37dfa01c35467fa2aa277dbea50a101dba96da1ca41fc8f90a3a191c7cc1773727fdcd808ee774a109b272ac86268947f8d93f1625efb2888fa054822c6c8871a0cb4f3eb7320a04bc3fdfc9a89a14f7bb875f646ca374314de85585f9c3225ddd68b3c1e0f8fc309ec868d5af7aae7dfc0121eec59bd6c50af42dbd71517a98676c504f1571a843ff060066eac2f98b5ed46049ad0d5441bc11fa172af12ce5a01639c4371108a4a22f3dec3e144d83797f44123759d696a2c5c9057e6f9cc1c582ff28e0dcad99528970a9d37d64e3b7c320dc8cee1dfccb556a04a488c0a5d65f3073f380acf35307e2616fc18c0c8c189bba86fb28430feae2de3b3171. Buffer after: 30 bytes: 001c41262f184c0c4d66397c41a8c67dba5a35f1cf5d673d0fcd8da2f7ae
2026-02-02T15:31:49.848387 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 467 bytes. First 4 bytes: [81, 17, 198, 221]
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 467, Got: 467
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 467, Bytes: 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
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 467
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(451) and MAC(16)
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 0c8c189bba86fb28430feae2de3b3171
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [81, 17, 198, 221]
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [12, 140, 24, 155]
2026-02-02T15:31:49.848387 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [12, 140, 24, 155, 186, 134, 251, 40, 67, 15, 234, 226, 222, 59, 49, 113]
2026-02-02T15:31:49.849361 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.849361 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.849361 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 451 bytes
2026-02-02T15:31:49.850365 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 451 bytes to _decryptedBuffer. New _decryptedBuffer.length: 451
2026-02-02T15:31:49.850365 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 439. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183]
2026-02-02T15:31:49.850365 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.850365 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.850365 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=439
2026-02-02T15:31:49.850365 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.850365 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.850365 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.851880 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=439
2026-02-02T15:31:49.851880 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 439, _decryptedBuffer.length: 439
2026-02-02T15:31:49.851880 [FINER] [SecuredConnection] SecuredConnection.read (length=439): Returning 439 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [181, 3, 10, 36, 8, 1, 18, 32, 184, 113, 39, 46, 199, 162, 51, 241, 95, 133, 32, 250]
2026-02-02T15:31:49.852386 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=439
2026-02-02T15:31:49.852386 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.852386 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 439, flags: 0
2026-02-02T15:31:49.852386 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 439 bytes directly to waiting reader
2026-02-02T15:31:49.852386 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 475
2026-02-02T15:31:49.852386 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, 437 bytes, duration=6ms
2026-02-02T15:31:49.856932 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. IsPush: false.
2026-02-02T15:31:49.858742 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: 0
2026-02-02T15:31:49.858742 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: 7
2026-02-02T15:31:49.858742 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
2026-02-02T15:31:49.858742 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:31:49.858742 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE - Added protocols: 7, Removed protocols: 0
2026-02-02T15:31:49.859743 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: /ip4/127.0.0.1/tcp/58546
2026-02-02T15:31:49.859743 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58546 for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE via conn 1.
2026-02-02T15:31:49.859743 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.859743 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.860248 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE (181 bytes).
2026-02-02T15:31:49.860248 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:49.860248 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:49.873821 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:49.890115 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: true
2026-02-02T15:31:49.890115 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:49.890621 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:49.890621 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:49.891075 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.891075 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.891580 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE from record public key for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.891580 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.891580 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Found 2 addresses.
2026-02-02T15:31:49.891580 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: 2
2026-02-02T15:31:49.891580 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE based on remote connection address /ip4/127.0.0.1/tcp/4503. Before filter: 2
2026-02-02T15:31:49.891580 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4503 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:49.891580 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:49.891580 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: 2
2026-02-02T15:31:49.891580 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:49.892631 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.892631 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:49.892631 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.892631 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE from local peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k.
2026-02-02T15:31:49.892631 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.892631 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.892631 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE from received public key for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.894136 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE matches expected remote peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.894136 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Comparing with received key.
2026-02-02T15:31:49.894136 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE matches existing key in peerstore.
2026-02-02T15:31:49.894136 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:49.894746 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE in peerstore.
2026-02-02T15:31:49.894746 [FINE] [autonatv2] Peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE identification completed, updating peer map
2026-02-02T15:31:49.894746 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE supports push.
2026-02-02T15:31:49.894746 [FINER] [YamuxStream] [3][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:49.894746 [FINER] [YamuxStream] [3][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:49.894746 [FINE] [autonatv2] Updating peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr, /test/broadcast/1.0.0], connectedness=Connectedness.connected
2026-02-02T15:31:49.894746 [FINE] [autonatv2] Adding peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:49.894746 [FINE] [ambient_autonat_v2] Peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE supports AutoNAT v2, scheduling probe
2026-02-02T15:31:49.894746 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:49.898014 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:49.898014 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:49.899018 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:49.899018 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:49.900523 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001c846e14e2bb956491bfdb2b2a7e2d6af8e272258f83777578945361e0
2026-02-02T15:31:49.901526 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.902527 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.902527 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.902527 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.902527 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.902527 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.903526 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.903526 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.903526 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.903526 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(cbcf9743) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:49.903526 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(cbcf9743) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 41262f184c0c4d66397c41a8c67dba5a35f1cf5d673d0fcd8da2f7ae
2026-02-02T15:31:49.903526 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.903526 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.903526 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.903526 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.903526 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.903526 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.903526 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.904526 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(5d5ef2d6) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.904526 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(5d5ef2d6) END (from buffer). Returning 28 bytes: 41262f184c0c4d66397c41a8c67dba5a35f1cf5d673d0fcd8da2f7ae. Buffer after: 0 bytes: 
2026-02-02T15:31:49.904526 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [65, 38, 47, 24]
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 41262f184c0c4d66397c41a8c67dba5a35f1cf5d673d0fcd8da2f7ae
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 41262f184c0c4d66397c41a8
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c67dba5a35f1cf5d673d0fcd8da2f7ae
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [65, 38, 47, 24]
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [198, 125, 186, 90]
2026-02-02T15:31:49.904526 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [198, 125, 186, 90, 53, 241, 207, 93, 103, 61, 15, 205, 141, 162, 247, 174]
2026-02-02T15:31:49.904526 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.905526 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:49.905526 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:49.905526 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.905526 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.905526 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.905526 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.905526 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:49.905526 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:49.905526 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:31:49.907628 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c846e14e2bb956491bfdb2b2a7e2d6af8e272258f83777578945361e0
2026-02-02T15:31:49.907628 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(895bd977) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:49.907628 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(895bd977) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 846e14e2bb956491bfdb2b2a7e2d6af8e272258f83777578945361e0
2026-02-02T15:31:49.907628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:49.907628 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:49.907628 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:49.907628 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:49.907628 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:49.907628 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:49.907628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:49.907628 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f61d62ba) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:49.907628 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f61d62ba) END (from buffer). Returning 28 bytes: 846e14e2bb956491bfdb2b2a7e2d6af8e272258f83777578945361e0. Buffer after: 0 bytes: 
2026-02-02T15:31:49.907628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [132, 110, 20, 226]
2026-02-02T15:31:49.907628 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 846e14e2bb956491bfdb2b2a7e2d6af8e272258f83777578945361e0
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 846e14e2bb956491bfdb2b2a
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7e2d6af8e272258f83777578945361e0
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [132, 110, 20, 226]
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [126, 45, 106, 248]
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [126, 45, 106, 248, 226, 114, 37, 143, 131, 119, 117, 120, 148, 83, 97, 224]
2026-02-02T15:31:49.908640 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:49.908640 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:49.908640 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:49.909639 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:49.909639 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:49.909639 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:49.909639 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:49.909639 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:49.909639 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:49.909639 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001c846e14e2bb956491bfdb2b2a7e2d6af8e272...
2026-02-02T15:31:49.909639 [FINE] [YamuxStream] [3][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.closing.
2026-02-02T15:31:49.909639 [FINE] [YamuxStream] [3][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.closing.
2026-02-02T15:31:49.910639 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, duration=149ms
2026-02-02T15:31:49.910639 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:49.910639 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.911639 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.911639 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.911639 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.911639 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.912225 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.912225 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.912225 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.912225 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.912225 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(bb7d8c24) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.912225 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(bb7d8c24) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:49.913238 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:49.913238 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:49.913238 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:49.913238 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:49.913238 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:49.913238 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:49.913238 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:49.913238 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:49.913238 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:49.914237 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(c325be08) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:49.914237 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(c325be08) ASYNC WAIT. Requested: 2. Buffer: 0
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:50.086683 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4101: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:50.086683 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4101 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101
2026-02-02T15:31:50.087682 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:50.087682 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.087682 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:31:50.087682 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.087682 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:50.087682 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.087682 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:50.087682 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:50.087682 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.087682 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.088682 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:50.088682 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
2026-02-02T15:31:50.096008 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:50.096008 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.096008 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 462787195, network.listenAddresses: []
2026-02-02T15:31:50.098523 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:50.098523 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, Host hashCode: 492474711
2026-02-02T15:31:50.098523 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.098523 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.098523 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:50.098523 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:50.098523 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:50.099523 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:50.099523 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, Host hashCode: 492474711
2026-02-02T15:31:50.099523 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.099523 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.099523 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:50.099523 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:50.100898 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:50.100898 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:50.100898 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:50.100898 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.100898 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 462787195, network.listenAddresses: []
2026-02-02T15:31:50.101904 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.101904 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 462787195, network.listenAddresses: []
2026-02-02T15:31:50.101904 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:50.101904 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:50.102916 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, Host hashCode: 492474711
2026-02-02T15:31:50.102916 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.102916 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.102916 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:50.102916 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:50.102916 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:50.103915 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.103915 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 462787195, network.listenAddresses: []
2026-02-02T15:31:50.103915 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:50.103915 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.103915 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 462787195, network.listenAddresses: []
2026-02-02T15:31:50.103915 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:31:50.103915 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:50.104915 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4101 with ID: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:50.104915 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:50.104915 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:50.105915 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:50.105915 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:50.105915 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:50.106421 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:50.106421 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:31:50.106421 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:50.106421 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:50.106421 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:50.107424 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:50.107424 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:50.107424 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:50.108424 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:50.108424 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.109424 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.109424 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.109424 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 4ms (dial: 3ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.110423 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:50.110423 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.110423 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:50.111124 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:50.111124 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:50.111124 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:50.111124 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:50.112128 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:50.112128 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:50.113128 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:50.114128 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.114601 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.115105 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.115105 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 3ms (dial: 3ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.115105 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:50.115105 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.115105 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:50.120118 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:50.121118 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:50.121118 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:50.121118 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:50.121118 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:50.121118 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:50.128182 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:50.131182 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.133182 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.156343 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 18ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.157144 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 41ms (dial: 37ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.157144 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:50.158147 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.158147 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:50.158147 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:50.159147 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:50.159147 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:50.159147 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:50.159147 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:50.160147 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:50.163147 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:50.163147 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.163147 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.164146 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.164146 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 5ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:50.165145 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:50.165145 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:50.165145 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:50.166144 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:50.167145 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:50.174142 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.174142 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz - Initial _network.listenAddresses: []
2026-02-02T15:31:50.175142 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, Host hashCode: 682905032
2026-02-02T15:31:50.176141 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.176141 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.176141 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:50.176141 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:50.176141 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:50.180140 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:50.344368 [FINE] [ambient_autonat_v2] Probe generation 2 cancelled (current: 3)
2026-02-02T15:31:50.347957 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:31:50.348976 [FINE] [YamuxStream] [1][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:50.348976 [FINER] [YamuxStream] [1][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:50.348976 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:50.348976 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:50.349976 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:50.349976 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:50.349976 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 30 bytes: 001c87e477a10e14dd09db7b3822de762c7f9323c6b7e71492e0d6943271
2026-02-02T15:31:50.350483 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 30 bytes successfully. Data preview (hex): 001c87e477a10e14dd09db7b3822de762c7f9323...
2026-02-02T15:31:50.350483 [FINER] [YamuxStream] [1][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
2026-02-02T15:31:50.350988 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:50.350988 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:50.350988 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:50.351502 [FINE] [YamuxStream] [1][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:50.351502 [FINE] [YamuxStream] [1][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:50.351502 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:31:50.352567 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:31:50.355595 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:50.355595 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:50.356113 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:50.356113 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:50.356113 [FINER] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Writing 30 bytes: 001cbc56013fe70e6df011f705fde797376f784fe891ce503efd204a7d7f
2026-02-02T15:31:50.356113 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c87e477a10e14dd09db7b3822de762c7f9323c6b7e71492e0d6943271
2026-02-02T15:31:50.356113 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(c3b8fb19) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:50.357165 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(c3b8fb19) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 87e477a10e14dd09db7b3822de762c7f9323c6b7e71492e0d6943271
2026-02-02T15:31:50.357165 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:50.357165 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:50.357165 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:50.357165 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:50.357165 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:50.357678 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:50.357678 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:50.357678 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(33a091be) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:50.357678 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(33a091be) END (from buffer). Returning 28 bytes: 87e477a10e14dd09db7b3822de762c7f9323c6b7e71492e0d6943271. Buffer after: 0 bytes: 
2026-02-02T15:31:50.357678 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [135, 228, 119, 161]
2026-02-02T15:31:50.357678 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:50.357678 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 87e477a10e14dd09db7b3822de762c7f9323c6b7e71492e0d6943271
2026-02-02T15:31:50.357678 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:50.358761 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:50.358761 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 87e477a10e14dd09db7b3822
2026-02-02T15:31:50.358761 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: de762c7f9323c6b7e71492e0d6943271
2026-02-02T15:31:50.358761 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [135, 228, 119, 161]
2026-02-02T15:31:50.358761 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [222, 118, 44, 127]
2026-02-02T15:31:50.358761 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [222, 118, 44, 127, 147, 35, 198, 183, 231, 20, 146, 224, 214, 148, 50, 113]
2026-02-02T15:31:50.358761 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:50.358761 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:50.359761 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:50.359761 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:50.359761 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:50.359761 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:50.359761 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:50.360332 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:50.360332 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:50.360332 [FINEST] [TCPConnection] TCPConnection.write (id: e14d1479-3c51-495c-97aa-2f302b27b97b): Flushed 30 bytes successfully. Data preview (hex): 001cbc56013fe70e6df011f705fde797376f784f...
2026-02-02T15:31:50.361348 [FINE] [YamuxStream] [1][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:31:50.361348 [FINER] [YamuxStream] [1][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:31:50.362428 [FINE] [Swarm] AcceptStream loop for conn 0 to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN terminated due to connection closure.
2026-02-02T15:31:50.364482 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:31:50.364482 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:50.364482 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:50.365553 [FINE] [TCPConnection] TCPConnection(e14d1479-3c51-495c-97aa-2f302b27b97b) - Connection closed.
2026-02-02T15:31:50.365553 [FINEST] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cbc56013fe70e6df011f705fde797376f784fe891ce503efd204a7d7f
2026-02-02T15:31:50.366564 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:50.366564 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:50.366564 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:50.366564 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:50.366564 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:50.366564 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:50.366564 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:50.366564 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:50.366564 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:50.366564 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(b2bb5a0e) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:50.366564 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(b2bb5a0e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: bc56013fe70e6df011f705fde797376f784fe891ce503efd204a7d7f
2026-02-02T15:31:50.366564 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:50.366564 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:50.366564 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:50.366564 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:50.366564 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:50.367571 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:50.367571 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(f28c4a37) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:50.367571 [FINER] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Read(f28c4a37) END (from buffer). Returning 28 bytes: bc56013fe70e6df011f705fde797376f784fe891ce503efd204a7d7f. Buffer after: 0 bytes: 
2026-02-02T15:31:50.367571 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [188, 86, 1, 63]
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: bc56013fe70e6df011f705fde797376f784fe891ce503efd204a7d7f
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: bc56013fe70e6df011f705fd
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e797376f784fe891ce503efd204a7d7f
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [188, 86, 1, 63]
2026-02-02T15:31:50.367571 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [231, 151, 55, 111]
2026-02-02T15:31:50.368583 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [231, 151, 55, 111, 120, 79, 232, 145, 206, 80, 62, 253, 32, 74, 125, 127]
2026-02-02T15:31:50.368583 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:50.368583 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065140705): [123, 43, 120, 169, 68, 196, 95, 94, 29, 88, 189, 42, 248, 72, 9, 121, 164, 122, 91, 224, 112, 21, 13, 218, 207, 94, 251, 85, 0, 5, 125, 198]
2026-02-02T15:31:50.368583 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:50.368583 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:50.368583 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:31:50.368583 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:50.368583 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:50.370088 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:50.370088 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:50.370088 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:50.370088 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:50.370088 [FINER] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Writing 30 bytes: 001c1b335d0f1a69d1d85bde51c026e4aa3e00361e497c16b63b3f4a55a2
2026-02-02T15:31:50.372130 [FINE] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Socket stream done.
2026-02-02T15:31:50.372130 [FINEST] [TCPConnection] TCPConnection.write (id: 77887f15-e9dc-47f6-ad26-0514b001bcf5): Flushed 30 bytes successfully. Data preview (hex): 001c1b335d0f1a69d1d85bde51c026e4aa3e0036...
2026-02-02T15:31:50.372130 [FINE] [YamuxStream] [0][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:50.372130 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:50.372130 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:50.372130 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:50.373140 [FINE] [YamuxStream] [0][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:50.373140 [FINE] [YamuxStream] [0][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:31:50.373140 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWCD77ihjNKWaJRDGBWAq1owWURrycmS8HJV8ZLCZo1GbA: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:31:50.373140 [FINE] [TCPConnection] TCPConnection(77887f15-e9dc-47f6-ad26-0514b001bcf5) - Connection closed.
2026-02-02T15:31:50.790174 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:50.790174 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:50.790174 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:50.791172 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:50.791172 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:50.791172 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:50.791172 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:50.791172 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:50.791172 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:50.791172 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:50.791172 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:50.792172 [INFO] [Config] [Config.newNode] for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz: Host created. Listening will be handled by host.start().
2026-02-02T15:31:50.792172 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:50.792172 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, network.hashCode: 101608061, initial network.listenAddresses: []
2026-02-02T15:31:50.792172 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:50.792172 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4102]. Attempting to listen via _network.listen().
2026-02-02T15:31:50.793171 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:50.793171 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4102] for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:50.793171 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:31:50.793171 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:50.794173 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4102 with transport TCPTransport for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:50.794173 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4102 with transport TCPTransport
00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:50.922552 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 via protocol /test/broadcast/1.0.0
2026-02-02T15:31:50.928075 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, protocols: [/test/broadcast/1.0.0]
2026-02-02T15:31:50.928075 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5...
2026-02-02T15:31:50.928075 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:50.928075 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5...
2026-02-02T15:31:50.931075 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Context HashCode: 836421944
2026-02-02T15:31:50.932074 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5.
2026-02-02T15:31:50.932074 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5).
2026-02-02T15:31:50.932074 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5, existing_conns=2
2026-02-02T15:31:50.932074 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5"
2026-02-02T15:31:50.932578 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5"
2026-02-02T15:31:50.932578 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Validating health...
2026-02-02T15:31:50.933581 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Returning newest connection ID: 0
2026-02-02T15:31:50.934581 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Conn runtimeType: SwarmConn, Conn ID: 0, Conn local: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, Conn remote: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:50.934581 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 on SwarmConn 0.
2026-02-02T15:31:50.935580 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Context HashCode: 836421944
2026-02-02T15:31:50.935580 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:50.935580 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:50.935580 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:50.935580 [FINE] [YamuxStream] [0][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:50.936583 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:50.936583 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:50.936583 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:50.937581 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:50.937581 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001c4b5c66654a73aaff674766bc07251d46aee3b51857108adc4b4e42bc
2026-02-02T15:31:50.942087 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001c4b5c66654a73aaff674766bc07251d46aee3...
2026-02-02T15:31:50.974077 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c4b5c66654a73aaff674766bc07251d46aee3b51857108adc4b4e42bc
2026-02-02T15:31:50.974077 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(0ed23abd) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:50.974077 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(0ed23abd) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 4b5c66654a73aaff674766bc07251d46aee3b51857108adc4b4e42bc
2026-02-02T15:31:50.974077 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:50.975077 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:50.975077 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:50.975077 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:50.975077 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:50.975077 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:50.975077 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:50.976076 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(1b71d4f6) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:50.976076 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(1b71d4f6) END (from buffer). Returning 28 bytes: 4b5c66654a73aaff674766bc07251d46aee3b51857108adc4b4e42bc. Buffer after: 0 bytes: 
2026-02-02T15:31:50.976076 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [75, 92, 102, 101]
2026-02-02T15:31:50.976076 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:50.976076 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 4b5c66654a73aaff674766bc07251d46aee3b51857108adc4b4e42bc
2026-02-02T15:31:50.976076 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:50.976076 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:50.976076 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4b5c66654a73aaff674766bc
2026-02-02T15:31:50.977076 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 07251d46aee3b51857108adc4b4e42bc
2026-02-02T15:31:50.977076 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [75, 92, 102, 101]
2026-02-02T15:31:50.977076 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [7, 37, 29, 70]
2026-02-02T15:31:50.977076 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [7, 37, 29, 70, 174, 227, 181, 24, 87, 16, 138, 220, 75, 78, 66, 188]
2026-02-02T15:31:50.977076 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:50.978076 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:50.978076 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:50.978076 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:50.978076 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:50.978076 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:50.978076 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:50.980075 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:50.980075 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:50.981075 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:50.981075 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:50.981075 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 30 bytes: 001cd631b4ea19cea6967e6330cb77ce398d3d3368c1f7a25795fb545c3b
2026-02-02T15:31:50.982074 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 30 bytes successfully. Data preview (hex): 001cd631b4ea19cea6967e6330cb77ce398d3d33...
2026-02-02T15:31:50.983075 [FINE] [YamuxStream] [1][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:50.983075 [FINER] [YamuxStream] [1][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:50.984074 [FINE] [YamuxStream] [1][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:50.984074 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:50.984074 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:50.987073 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:50.988073 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:50.988073 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 30 bytes: 001cca0ee1727bab7770f53563cb97090042e90d5c6c692d5208ceee9992
2026-02-02T15:31:50.988073 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 30 bytes successfully. Data preview (hex): 001cca0ee1727bab7770f53563cb97090042e90d...
2026-02-02T15:31:50.989073 [FINER] [YamuxStream] [1][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:50.989073 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k on conn 0
2026-02-02T15:31:50.989073 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067910989-9914 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:50.991072 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:50.991072 [FINEST] [YamuxStream] [1][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.071423 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:31:51.075292 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:31:51.077429 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cd631b4ea19cea6967e6330cb77ce398d3d3368c1f7a25795fb545c3b
2026-02-02T15:31:51.077429 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(a185d50b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.077429 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(a185d50b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: d631b4ea19cea6967e6330cb77ce398d3d3368c1f7a25795fb545c3b
2026-02-02T15:31:51.077941 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.077941 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.077941 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.077941 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.077941 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.077941 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.077941 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.077941 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(693a0af5) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.077941 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(693a0af5) END (from buffer). Returning 28 bytes: d631b4ea19cea6967e6330cb77ce398d3d3368c1f7a25795fb545c3b. Buffer after: 0 bytes: 
2026-02-02T15:31:51.077941 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [214, 49, 180, 234]
2026-02-02T15:31:51.078945 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.078945 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: d631b4ea19cea6967e6330cb77ce398d3d3368c1f7a25795fb545c3b
2026-02-02T15:31:51.078945 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.078945 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.078945 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d631b4ea19cea6967e6330cb
2026-02-02T15:31:51.078945 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 77ce398d3d3368c1f7a25795fb545c3b
2026-02-02T15:31:51.078945 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [214, 49, 180, 234]
2026-02-02T15:31:51.079449 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [119, 206, 57, 141]
2026-02-02T15:31:51.079449 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [119, 206, 57, 141, 61, 51, 104, 193, 247, 162, 87, 149, 251, 84, 92, 59]
2026-02-02T15:31:51.079449 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.079449 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:51.079449 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:51.080313 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.080313 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:51.080313 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.080313 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.080313 [FINER] [YamuxStream] [0][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:51.080313 [FINER] [YamuxStream] [0][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:51.080313 [FINE] [YamuxStream] [0][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:51.080313 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:51.080313 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:51.080313 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.080313 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.081318 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001cb87ea18075d75b123c5373563151d990db77ff7556e71357ae3c9441
2026-02-02T15:31:51.081318 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001cb87ea18075d75b123c5373563151d990db77...
2026-02-02T15:31:51.081318 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:31:51.081318 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:31:51.081318 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067911081-2290 for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:51.081318 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:51.082333 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:31:51.082333 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:51.082333 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:31:51.083333 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 already identified on this connection, skipping
2026-02-02T15:31:51.083333 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 (e.g., connection was closed). Identify will not complete.
2026-02-02T15:31:51.083333 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:31:51.083333 [FINE] [YamuxStream] [0][Client] StreamID=3 setDeadline() set to 2026-02-02T15:32:01.083333
2026-02-02T15:31:51.083333 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/test/broadcast/1.0.0] on stream 3...
2026-02-02T15:31:51.083333 [FINE] [YamuxStream] [0][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:51.083333 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:51.083333 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:51.083333 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:51.083333 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:51.083333 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 50 bytes: 0030573c790b7a37e060dd6f6ab2ed6611c55be0ca28949849b7ae3acff806e698029b15680bd7bb12d328c29a221abee149
2026-02-02T15:31:51.084838 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 50 bytes successfully. Data preview (hex): 0030573c790b7a37e060dd6f6ab2ed6611c55be0...
2026-02-02T15:31:51.084838 [FINE] [YamuxStream] [0][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:51.084838 [FINEST] [YamuxStream] [0][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.087152 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.087152 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.087152 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.087152 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.087152 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.087152 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.087152 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.087152 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.087152 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.087152 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(52b585a1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.087152 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(52b585a1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.095912 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001: ServerSocket closed.
2026-02-02T15:31:51.096417 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4001 connectionStream is done. Removing listener.
2026-02-02T15:31:51.096417 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001 already closed.
2026-02-02T15:31:51.097921 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001: ConnectionController closed.
2026-02-02T15:31:51.097921 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWFmbNrCSJmNonjm8iEoFi2Avs4hW9Zs2FGbK8qFrxQXgf
2026-02-02T15:31:51.099438 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cca0ee1727bab7770f53563cb97090042e90d5c6c692d5208ceee9992
2026-02-02T15:31:51.099438 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.099438 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.099438 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.099438 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.099438 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.099438 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.099438 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.099438 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.099438 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.099438 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(327cb3ba) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:51.101061 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(327cb3ba) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: ca0ee1727bab7770f53563cb97090042e90d5c6c692d5208ceee9992
2026-02-02T15:31:51.101061 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.101061 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.101061 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.101061 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.101061 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.101061 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.101061 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.101601 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(c6c0be38) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.101601 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(c6c0be38) END (from buffer). Returning 28 bytes: ca0ee1727bab7770f53563cb97090042e90d5c6c692d5208ceee9992. Buffer after: 0 bytes: 
2026-02-02T15:31:51.101601 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [202, 14, 225, 114]
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: ca0ee1727bab7770f53563cb97090042e90d5c6c692d5208ceee9992
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ca0ee1727bab7770f53563cb
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 97090042e90d5c6c692d5208ceee9992
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [202, 14, 225, 114]
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [151, 9, 0, 66]
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [151, 9, 0, 66, 233, 13, 92, 108, 105, 45, 82, 8, 206, 238, 153, 146]
2026-02-02T15:31:51.101601 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.101601 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:51.102604 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:51.103109 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.103109 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.103109 [FINER] [YamuxStream] [0][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:31:51.103109 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cb87ea18075d75b123c5373563151d990db77ff7556e71357ae3c9441
2026-02-02T15:31:51.103109 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(52b585a1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.103109 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(52b585a1) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: b87ea18075d75b123c5373563151d990db77ff7556e71357ae3c9441
2026-02-02T15:31:51.103109 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.103109 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.103109 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(f44da27e) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.103109 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(f44da27e) END (from buffer). Returning 28 bytes: b87ea18075d75b123c5373563151d990db77ff7556e71357ae3c9441. Buffer after: 0 bytes: 
2026-02-02T15:31:51.103109 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [184, 126, 161, 128]
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.103109 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b87ea18075d75b123c5373563151d990db77ff7556e71357ae3c9441
2026-02-02T15:31:51.104615 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.104615 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.106124 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b87ea18075d75b123c537356
2026-02-02T15:31:51.106124 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3151d990db77ff7556e71357ae3c9441
2026-02-02T15:31:51.107130 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [184, 126, 161, 128]
2026-02-02T15:31:51.107130 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [49, 81, 217, 144]
2026-02-02T15:31:51.107130 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [49, 81, 217, 144, 219, 119, 255, 117, 86, 231, 19, 87, 174, 60, 148, 65]
2026-02-02T15:31:51.107130 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.107130 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.107130 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:51.107130 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.108135 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:51.108135 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.108135 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.108135 [FINER] [YamuxStream] [1][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:51.108135 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.108135 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.108135 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.109640 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.109640 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.109640 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.109640 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.109640 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.109640 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.109640 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(dcbe8957) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.110661 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(dcbe8957) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.110661 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030573c790b7a37e060dd6f6ab2ed6611c55be0ca28949849b7ae3acff806e698029b15680bd7bb12d328c29a221abee149
2026-02-02T15:31:51.111662 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.111662 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.112661 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.112661 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.112661 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.112661 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.112661 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.112661 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.112661 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.112661 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2fa641cb) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:51.112661 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2fa641cb) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 573c790b7a37e060dd6f6ab2ed6611c55be0ca28949849b7ae3acff806e698029b15680bd7bb12d328c29a221abee149
2026-02-02T15:31:51.112661 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:51.114166 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:51.114166 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(db47159d) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:51.114166 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(db47159d) END (from buffer). Returning 48 bytes: 573c790b7a37e060dd6f6ab2ed6611c55be0ca28949849b7ae3acff806e698029b15680bd7bb12d328c29a221abee149. Buffer after: 0 bytes: 
2026-02-02T15:31:51.114166 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [87, 60, 121, 11]
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 573c790b7a37e060dd6f6ab2ed6611c55be0ca28949849b7ae3acff806e698029b15680bd7bb12d328c29a221abee149
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:51.114166 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:51.115184 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 573c790b7a37e060dd6f6ab2ed6611c55be0ca28949849b7ae3acff806e69802
2026-02-02T15:31:51.115184 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9b15680bd7bb12d328c29a221abee149
2026-02-02T15:31:51.115184 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [87, 60, 121, 11]
2026-02-02T15:31:51.115184 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [155, 21, 104, 11]
2026-02-02T15:31:51.115184 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [155, 21, 104, 11, 215, 187, 18, 211, 40, 194, 154, 34, 26, 190, 225, 73]
2026-02-02T15:31:51.115184 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.115184 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:31:51.116152 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:51.116152 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.116152 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:51.117155 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:51.117155 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.117155 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:51.117155 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.117155 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:51.117155 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:51.117155 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:51.117155 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.117155 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.117155 [FINE] [YamuxStream] [1][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:51.118521 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:51.118521 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:51.118521 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:51.119520 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:51.120519 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 50 bytes: 0030b19157790e437e89412443cbcac029c44bbbe6dbbfc6dfe34422b75a5e4daf5c17c313b86f8cbae8dfa0e933336b8ccb
2026-02-02T15:31:51.120519 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 50 bytes successfully. Data preview (hex): 0030b19157790e437e89412443cbcac029c44bbb...
2026-02-02T15:31:51.121580 [FINE] [YamuxStream] [1][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 4ms
2026-02-02T15:31:51.121580 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:51.121580 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:51.121580 [FINEST] [YamuxStream] [1][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.121580 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.121580 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.123085 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.123085 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.123085 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.123085 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.123085 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.123085 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.123085 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.123085 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(235f530e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.125101 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(235f530e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.126951 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030b19157790e437e89412443cbcac029c44bbbe6dbbfc6dfe34422b75a5e4daf5c17c313b86f8cbae8dfa0e933336b8ccb
2026-02-02T15:31:51.126951 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(dcbe8957) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.126951 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(dcbe8957) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: b19157790e437e89412443cbcac029c44bbbe6dbbfc6dfe34422b75a5e4daf5c17c313b86f8cbae8dfa0e933336b8ccb
2026-02-02T15:31:51.126951 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:51.126951 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.126951 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:51.126951 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:51.126951 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:51.126951 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:51.127956 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:51.127956 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(f9df6a3d) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:51.127956 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(f9df6a3d) END (from buffer). Returning 48 bytes: b19157790e437e89412443cbcac029c44bbbe6dbbfc6dfe34422b75a5e4daf5c17c313b86f8cbae8dfa0e933336b8ccb. Buffer after: 0 bytes: 
2026-02-02T15:31:51.127956 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [177, 145, 87, 121]
2026-02-02T15:31:51.127956 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:51.127956 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: b19157790e437e89412443cbcac029c44bbbe6dbbfc6dfe34422b75a5e4daf5c17c313b86f8cbae8dfa0e933336b8ccb
2026-02-02T15:31:51.127956 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:51.127956 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:51.127956 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b19157790e437e89412443cbcac029c44bbbe6dbbfc6dfe34422b75a5e4daf5c
2026-02-02T15:31:51.127956 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 17c313b86f8cbae8dfa0e933336b8ccb
2026-02-02T15:31:51.129805 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [177, 145, 87, 121]
2026-02-02T15:31:51.129805 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [23, 195, 19, 184]
2026-02-02T15:31:51.130202 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [23, 195, 19, 184, 111, 140, 186, 232, 223, 160, 233, 51, 51, 107, 140, 203]
2026-02-02T15:31:51.130202 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.130202 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:31:51.130731 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:51.130731 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:51.130731 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:51.130731 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:51.130731 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.130731 [FINE] [YamuxStream] [0][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:51.130731 [FINE] [YamuxStream] [0][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:51.130731 [FINE] [YamuxStream] [0][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:51.132308 [FINE] [YamuxStream] [0][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:51.132308 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:31:51.132308 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:51.132308 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:31:51.132308 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:31:51.132308 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 53 bytes: 0033f38195fbeaff8dd3ab81d3b45ee1751b1ea9bed12021db8198e88967544f0659de065128d60f67fb62f050711f83a6d4c355f2
2026-02-02T15:31:51.133339 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 53 bytes successfully. Data preview (hex): 0033f38195fbeaff8dd3ab81d3b45ee1751b1ea9...
2026-02-02T15:31:51.133339 [FINE] [YamuxStream] [0][Client] StreamID=3 Direct write: Successfully wrote all 23 bytes in 1ms
2026-02-02T15:31:51.133339 [FINEST] [YamuxStream] [0][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.133339 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.133339 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.133339 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.133339 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.133339 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.133339 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.133339 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.133339 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.133339 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.133339 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(cec9996f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.133339 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(cec9996f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.133339 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 0033f38195fbeaff8dd3ab81d3b45ee1751b1ea9bed12021db8198e88967544f0659de065128d60f67fb62f050711f83a6d4c355f2
2026-02-02T15:31:51.133339 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(235f530e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.133339 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(235f530e) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: f38195fbeaff8dd3ab81d3b45ee1751b1ea9bed12021db8198e88967544f0659de065128d60f67fb62f050711f83a6d4c355f2
2026-02-02T15:31:51.133339 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:31:51.134843 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:31:51.134843 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(8ccd357c) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:31:51.134843 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(8ccd357c) END (from buffer). Returning 51 bytes: f38195fbeaff8dd3ab81d3b45ee1751b1ea9bed12021db8198e88967544f0659de065128d60f67fb62f050711f83a6d4c355f2. Buffer after: 0 bytes: 
2026-02-02T15:31:51.134843 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [243, 129, 149, 251]
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: f38195fbeaff8dd3ab81d3b45ee1751b1ea9bed12021db8198e88967544f0659de065128d60f67fb62f050711f83a6d4c355f2
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:31:51.134843 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: f38195fbeaff8dd3ab81d3b45ee1751b1ea9bed12021db8198e88967544f0659de0651
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 28d60f67fb62f050711f83a6d4c355f2
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [243, 129, 149, 251]
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [40, 214, 15, 103]
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [40, 214, 15, 103, 251, 98, 240, 80, 113, 31, 131, 166, 212, 195, 85, 242]
2026-02-02T15:31:51.135367 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.135367 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 35 bytes
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:31:51.135367 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:31:51.135367 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.135367 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.136383 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:31:51.136383 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.136383 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.136383 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.136383 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:31:51.136383 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:31:51.136383 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:31:51.136383 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:31:51.136383 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.137381 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:31:51.137381 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:31:51.137381 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:31:51.137381 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/test/broadcast/1.0.0"
2026-02-02T15:31:51.137885 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/test/broadcast/1.0.0"
2026-02-02T15:31:51.137885 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/test/broadcast/1.0.0". Sending acknowledgment: "/test/broadcast/1.0.0".
2026-02-02T15:31:51.137885 [FINE] [YamuxStream] [1][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:51.137885 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:31:51.137885 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:51.137885 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:31:51.137885 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:31:51.137885 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 53 bytes: 003309669be225f116462cf29e5c16b73af03dd71465a9bb471760d11835906c8feacd46fb3f6e8441e72e3cb00659a74b7dc30945
2026-02-02T15:31:51.137885 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.138887 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.138887 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.138887 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.138887 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.138887 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.138887 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.138887 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.138887 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.138887 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(66d66ac9) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.138887 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(66d66ac9) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.140847 [FINEST] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 003309669be225f116462cf29e5c16b73af03dd71465a9bb471760d11835906c8feacd46fb3f6e8441e72e3cb00659a74b7dc30945
2026-02-02T15:31:51.141850 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(cec9996f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.142355 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(cec9996f) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: 09669be225f116462cf29e5c16b73af03dd71465a9bb471760d11835906c8feacd46fb3f6e8441e72e3cb00659a74b7dc30945
2026-02-02T15:31:51.142355 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:31:51.142355 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:31:51.142355 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(ebc8397e) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:31:51.142355 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(ebc8397e) END (from buffer). Returning 51 bytes: 09669be225f116462cf29e5c16b73af03dd71465a9bb471760d11835906c8feacd46fb3f6e8441e72e3cb00659a74b7dc30945. Buffer after: 0 bytes: 
2026-02-02T15:31:51.142355 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [9, 102, 155, 226]
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: 09669be225f116462cf29e5c16b73af03dd71465a9bb471760d11835906c8feacd46fb3f6e8441e72e3cb00659a74b7dc30945
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 09669be225f116462cf29e5c16b73af03dd71465a9bb471760d11835906c8feacd46fb
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3f6e8441e72e3cb00659a74b7dc30945
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [9, 102, 155, 226]
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [63, 110, 132, 65]
2026-02-02T15:31:51.142355 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [63, 110, 132, 65, 231, 46, 60, 176, 6, 89, 167, 75, 125, 195, 9, 69]
2026-02-02T15:31:51.142355 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.143617 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058971833): [252, 56, 120, 122, 57, 20, 90, 85, 132, 129, 94, 91, 149, 203, 234, 88, 237, 249, 128, 168, 111, 165, 145, 65, 123, 222, 105, 95, 189, 26, 120, 104]
2026-02-02T15:31:51.143617 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 35 bytes
2026-02-02T15:31:51.143617 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:31:51.143617 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:31:51.143617 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.143617 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.144121 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:31:51.144121 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.144121 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.144121 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.144121 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:31:51.144121 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:31:51.144121 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:31:51.144121 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:31:51.144121 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.144121 [FINE] [YamuxStream] [0][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:31:51.144121 [FINE] [YamuxStream] [0][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:31:51.144121 [FINE] [YamuxStream] [0][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:31:51.144671 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /test/broadcast/1.0.0 on stream 3
2026-02-02T15:31:51.144671 [FINE] [YamuxStream] [0][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:31:51.144671 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /test/broadcast/1.0.0 on stream 3...
2026-02-02T15:31:51.144671 [FINE] [StreamScopeImpl] stream-1770067911081-2290: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:51.144671 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/broadcast/1.0.0
2026-02-02T15:31:51.144671 [FINE] [StreamScopeImpl] stream-1770067911081-2290: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:51.144671 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:31:51.145680 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /test/broadcast/1.0.0
2026-02-02T15:31:51.145680 [FINE] [YamuxStream] [0][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 3 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524245
2026-02-02T15:31:51.145680 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 15, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3, 2, 104, 105])
2026-02-02T15:31:51.146184 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:51.146184 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 31 bytes (plaintext was 15)
2026-02-02T15:31:51.146184 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 33
2026-02-02T15:31:51.146184 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 33 bytes: 001fb3ce875aba7fb04fd284e1dd9988177616ed231d66ff04ce335009ae8f0718
2026-02-02T15:31:51.146184 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 53 bytes successfully. Data preview (hex): 003309669be225f116462cf29e5c16b73af03dd7...
2026-02-02T15:31:51.146184 [FINE] [YamuxStream] [1][Server] StreamID=3 Direct write: Successfully wrote all 23 bytes in 8ms
2026-02-02T15:31:51.146184 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/test/broadcast/1.0.0".
2026-02-02T15:31:51.146184 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/test/broadcast/1.0.0" and its handler.
2026-02-02T15:31:51.146184 [FINE] [multistream] [multistreamMuxer - handle] Protocol /test/broadcast/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:51.146184 [FINE] [StreamScopeImpl] stream-1770067910989-9914: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:51.146184 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/broadcast/1.0.0
2026-02-02T15:31:51.146184 [FINE] [StreamScopeImpl] stream-1770067910989-9914: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:51.146184 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /test/broadcast/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:51.147688 [FINEST] [YamuxStream] [1][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.148867 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.149930 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.149930 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.149930 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.149930 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.149930 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.149930 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.149930 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.149930 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.149930 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(b8aca731) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.149930 [FINER] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Read(b8aca731) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.149930 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (33 bytes): 001fb3ce875aba7fb04fd284e1dd9988177616ed231d66ff04ce335009ae8f0718
2026-02-02T15:31:51.149930 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(66d66ac9) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.150930 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(66d66ac9) END (from buffer). Returning 2 bytes: 001f. Buffer after: 31 bytes: b3ce875aba7fb04fd284e1dd9988177616ed231d66ff04ce335009ae8f0718
2026-02-02T15:31:51.150930 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 31]
2026-02-02T15:31:51.150930 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.150930 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 31]
2026-02-02T15:31:51.150930 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001f
2026-02-02T15:31:51.150930 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 31
2026-02-02T15:31:51.150930 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 31
2026-02-02T15:31:51.150930 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 31 more bytes (have 0/31)
2026-02-02T15:31:51.151433 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(832c6c16) START. Requested: 31. Buffer: 31 bytes.
2026-02-02T15:31:51.151433 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(832c6c16) END (from buffer). Returning 31 bytes: b3ce875aba7fb04fd284e1dd9988177616ed231d66ff04ce335009ae8f0718. Buffer after: 0 bytes: 
2026-02-02T15:31:51.151433 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 31 bytes. First 4 bytes: [179, 206, 135, 90]
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 31, Got: 31
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 31, Bytes: b3ce875aba7fb04fd284e1dd9988177616ed231d66ff04ce335009ae8f0718
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 31
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(15) and MAC(16)
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b3ce875aba7fb04fd284e1dd998817
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7616ed231d66ff04ce335009ae8f0718
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [179, 206, 135, 90]
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [118, 22, 237, 35]
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [118, 22, 237, 35, 29, 102, 255, 4, 206, 51, 80, 9, 174, 143, 7, 24]
2026-02-02T15:31:51.151433 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.151433 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 15 bytes
2026-02-02T15:31:51.152494 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 15 bytes to _decryptedBuffer. New _decryptedBuffer.length: 15
2026-02-02T15:31:51.152494 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 3. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3]
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=3
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=3
2026-02-02T15:31:51.152494 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 3, _decryptedBuffer.length: 3
2026-02-02T15:31:51.152494 [FINER] [SecuredConnection] SecuredConnection.read (length=3): Returning 3 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [2, 104, 105]
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=3
2026-02-02T15:31:51.152494 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.154 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 3, flags: 0
2026-02-02T15:31:51.154 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 3 bytes directly to waiting reader
2026-02-02T15:31:51.154 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 46
2026-02-02T15:31:51.155018 [FINEST] [YamuxStream] [1][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:51.155018 [FINEST] [YamuxStream] [1][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:31:51.155018 [FINEST] [YamuxStream] [1][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:31:51.155018 [FINEST] [YamuxStream] [1][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:51.155018 [FINEST] [YamuxStream] [1][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:31:51.155522 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 33 bytes successfully. Data preview (hex): 001fb3ce875aba7fb04fd284e1dd9988177616ed...
2026-02-02T15:31:51.155522 [FINE] [YamuxStream] [0][Client] StreamID=3 Direct write: Successfully wrote all 3 bytes in 9ms
2026-02-02T15:31:51.155522 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:31:51.157033 [FINE] [YamuxStream] [0][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:31:51.157033 [FINER] [YamuxStream] [0][Client] StreamID=3 Sending pending WINDOW_UPDATE for 43 consumed bytes before local FIN.
2026-02-02T15:31:51.157033 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43])
2026-02-02T15:31:51.157033 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:31:51.157033 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.157033 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.157546 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001ccf655444dcf401065db46772c9566c93bcd519b42b53a83d81f8943a
2026-02-02T15:31:51.157546 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001ccf655444dcf401065db46772c9566c93bcd5...
2026-02-02T15:31:51.157546 [FINER] [YamuxStream] [0][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:51.157546 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:51.157546 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.158055 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001cd0b344d498e0750b6226998a2a892e446c3e9e13c341c5c27f355671
2026-02-02T15:31:51.158055 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.158055 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.158055 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.158055 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.158055 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.158055 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.158055 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2b0b7695) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.158055 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2b0b7695) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.158055 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ccf655444dcf401065db46772c9566c93bcd519b42b53a83d81f8943a
2026-02-02T15:31:51.158055 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2b0b7695) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.158055 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(2b0b7695) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: cf655444dcf401065db46772c9566c93bcd519b42b53a83d81f8943a
2026-02-02T15:31:51.158055 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.158055 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.159138 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.159138 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(6c87cf50) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.159138 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(6c87cf50) END (from buffer). Returning 28 bytes: cf655444dcf401065db46772c9566c93bcd519b42b53a83d81f8943a. Buffer after: 0 bytes: 
2026-02-02T15:31:51.159138 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [207, 101, 84, 68]
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: cf655444dcf401065db46772c9566c93bcd519b42b53a83d81f8943a
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: cf655444dcf401065db46772
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c9566c93bcd519b42b53a83d81f8943a
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [207, 101, 84, 68]
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [201, 86, 108, 147]
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [201, 86, 108, 147, 188, 213, 25, 180, 43, 83, 168, 61, 129, 248, 148, 58]
2026-02-02T15:31:51.159138 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.159138 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.159138 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43]
2026-02-02T15:31:51.159138 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.159138 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.159138 [FINER] [YamuxStream] [1][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 43. Current our send window: 524245, New: 524288
2026-02-02T15:31:51.159138 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001cd0b344d498e0750b6226998a2a892e446c3e...
2026-02-02T15:31:51.159138 [FINER] [YamuxStream] [0][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:31:51.160633 [FINER] [YamuxStream] [0][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:51.160633 [FINER] [YamuxStream] [0][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:51.160633 [FINER] [YamuxStream] [0][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:51.160633 [FINE] [YamuxStream] [0][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.160633 [FINE] [YamuxStream] [0][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.160633 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:31:51.161745 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:31:51.161745 [FINE] [Libp2pRouter] [VERBOSE] Message sent successfully to 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:51.161745 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE via protocol /test/broadcast/1.0.0
2026-02-02T15:31:51.161745 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, protocols: [/test/broadcast/1.0.0]
2026-02-02T15:31:51.161745 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE...
2026-02-02T15:31:51.161745 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:51.161745 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE...
2026-02-02T15:31:51.161745 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Context HashCode: 97468402
2026-02-02T15:31:51.161745 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE.
2026-02-02T15:31:51.163249 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE).
2026-02-02T15:31:51.163249 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE, existing_conns=2
2026-02-02T15:31:51.163249 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE"
2026-02-02T15:31:51.163567 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE"
2026-02-02T15:31:51.163567 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Validating health...
2026-02-02T15:31:51.163567 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Returning newest connection ID: 1
2026-02-02T15:31:51.163567 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Conn runtimeType: SwarmConn, Conn ID: 1, Conn local: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k, Conn remote: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:51.163567 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE on SwarmConn 1.
2026-02-02T15:31:51.163567 [FINE] [SwarmConn] SwarmConn.newStream (1): Entered to peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Context HashCode: 97468402
2026-02-02T15:31:51.163567 [FINE] [SwarmConn] SwarmConn.newStream (1): Connection is open.
2026-02-02T15:31:51.163567 [FINE] [SwarmConn] SwarmConn.newStream (1): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:51.163567 [FINE] [SwarmConn] SwarmConn.newStream (1): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:51.164572 [FINE] [YamuxStream] [3][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:51.164572 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:51.164572 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:51.164572 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.164572 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.164572 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001c8dc24122611455bea2e490489e4f30c2754a91a4ba35f69cacf8c218
2026-02-02T15:31:51.164572 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001c8dc24122611455bea2e490489e4f30c2754a...
2026-02-02T15:31:51.164572 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cd0b344d498e0750b6226998a2a892e446c3e9e13c341c5c27f355671
2026-02-02T15:31:51.164572 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.164572 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.164572 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.164572 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.165725 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.165725 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.165725 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(79eab188) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:51.165725 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(79eab188) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: d0b344d498e0750b6226998a2a892e446c3e9e13c341c5c27f355671
2026-02-02T15:31:51.165725 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.165725 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.165725 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(ecca571c) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.165725 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(ecca571c) END (from buffer). Returning 28 bytes: d0b344d498e0750b6226998a2a892e446c3e9e13c341c5c27f355671. Buffer after: 0 bytes: 
2026-02-02T15:31:51.165725 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [208, 179, 68, 212]
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: d0b344d498e0750b6226998a2a892e446c3e9e13c341c5c27f355671
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d0b344d498e0750b6226998a
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2a892e446c3e9e13c341c5c27f355671
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [208, 179, 68, 212]
2026-02-02T15:31:51.165725 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [42, 137, 46, 68]
2026-02-02T15:31:51.166724 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [42, 137, 46, 68, 108, 62, 158, 19, 195, 65, 197, 194, 127, 53, 86, 113]
2026-02-02T15:31:51.166724 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.166724 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.166724 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:31:51.166724 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.166724 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:51.166724 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.166724 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.166724 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:51.166724 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:51.166724 [FINE] [YamuxStream] [1][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:31:51.166724 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c8dc24122611455bea2e490489e4f30c2754a91a4ba35f69cacf8c218
2026-02-02T15:31:51.166724 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(c325be08) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.166724 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(c325be08) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 8dc24122611455bea2e490489e4f30c2754a91a4ba35f69cacf8c218
2026-02-02T15:31:51.166724 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.166724 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.168114 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.168114 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(dfb4067d) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.168114 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(dfb4067d) END (from buffer). Returning 28 bytes: 8dc24122611455bea2e490489e4f30c2754a91a4ba35f69cacf8c218. Buffer after: 0 bytes: 
2026-02-02T15:31:51.168114 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [141, 194, 65, 34]
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 8dc24122611455bea2e490489e4f30c2754a91a4ba35f69cacf8c218
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8dc24122611455bea2e49048
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9e4f30c2754a91a4ba35f69cacf8c218
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [141, 194, 65, 34]
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [158, 79, 48, 194]
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [158, 79, 48, 194, 117, 74, 145, 164, 186, 53, 246, 156, 172, 248, 194, 24]
2026-02-02T15:31:51.168114 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.168114 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:51.169457 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:51.169457 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.169457 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:51.169457 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.169457 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.170461 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:51.170461 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:51.170461 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.170461 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.170461 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 30 bytes: 001c1d117e2cfdfc75ae44f2e04d3b0d071ca0f0a3d882959d31daff01bc
2026-02-02T15:31:51.171461 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.171461 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.171461 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.171461 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.171461 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.171461 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.171461 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.171461 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.171461 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.171461 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(a809942f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.172460 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(a809942f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.172460 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c1d117e2cfdfc75ae44f2e04d3b0d071ca0f0a3d882959d31daff01bc
2026-02-02T15:31:51.172460 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(bb7d8c24) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.172460 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(bb7d8c24) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 1d117e2cfdfc75ae44f2e04d3b0d071ca0f0a3d882959d31daff01bc
2026-02-02T15:31:51.172966 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.172966 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.172966 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.172966 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.172966 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.172966 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.172966 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.172966 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(ea556556) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.172966 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(ea556556) END (from buffer). Returning 28 bytes: 1d117e2cfdfc75ae44f2e04d3b0d071ca0f0a3d882959d31daff01bc. Buffer after: 0 bytes: 
2026-02-02T15:31:51.172966 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [29, 17, 126, 44]
2026-02-02T15:31:51.172966 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.172966 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1d117e2cfdfc75ae44f2e04d3b0d071ca0f0a3d882959d31daff01bc
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1d117e2cfdfc75ae44f2e04d
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3b0d071ca0f0a3d882959d31daff01bc
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [29, 17, 126, 44]
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [59, 13, 7, 28]
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [59, 13, 7, 28, 160, 240, 163, 216, 130, 149, 157, 49, 218, 255, 1, 188]
2026-02-02T15:31:51.173970 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:51.173970 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:51.173970 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.173970 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.173970 [FINER] [YamuxStream] [3][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:51.173970 [FINER] [YamuxStream] [3][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:51.173970 [FINE] [YamuxStream] [3][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:51.173970 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:51.175484 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:51.175484 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.175484 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.175484 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001c0904d74ae94bde834bb39cd509a9be24432b4feca2d7e9585b09dae3
2026-02-02T15:31:51.175484 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001c0904d74ae94bde834bb39cd509a9be24432b...
2026-02-02T15:31:51.176210 [FINE] [SwarmConn] SwarmConn.newStream (1): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:31:51.176210 [FINE] [SwarmConn] SwarmConn.newStream (1): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:31:51.176210 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067911176-7681 for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:51.176530 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:51.176530 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:31:51.176530 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:51.176530 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:31:51.176530 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE already identified on this connection, skipping
2026-02-02T15:31:51.176530 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE (e.g., connection was closed). Identify will not complete.
2026-02-02T15:31:51.176530 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:31:51.176530 [FINE] [YamuxStream] [3][Client] StreamID=3 setDeadline() set to 2026-02-02T15:32:01.176530
2026-02-02T15:31:51.176530 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/test/broadcast/1.0.0] on stream 3...
2026-02-02T15:31:51.176530 [FINE] [YamuxStream] [3][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:51.176530 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:51.177534 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:51.177534 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:51.177534 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:51.177534 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 50 bytes: 0030878e0f5b08365107b27b46606ac976023f095094084e65ef178e944aa4752785dd33c1aa760fbe146e3c864326773260
2026-02-02T15:31:51.177534 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 30 bytes successfully. Data preview (hex): 001c1d117e2cfdfc75ae44f2e04d3b0d071ca0f0...
2026-02-02T15:31:51.177534 [FINE] [YamuxStream] [2][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:51.177534 [FINER] [YamuxStream] [2][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:51.177534 [FINE] [YamuxStream] [2][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:51.177534 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:51.177534 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:51.177534 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.179038 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.179038 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 30 bytes: 001c1fe7d5a47b94b179f612523c0ab034291969914cc7677bd6c658ab43
2026-02-02T15:31:51.179580 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 30 bytes successfully. Data preview (hex): 001c1fe7d5a47b94b179f612523c0ab034291969...
2026-02-02T15:31:51.179580 [FINER] [YamuxStream] [2][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:51.179580 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k on conn 0
2026-02-02T15:31:51.179580 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067911179-9914 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:51.179580 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:51.180591 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.180591 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.180591 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.180591 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.180591 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.180591 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.180591 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.180591 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.180591 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.180591 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.180591 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(848ceee3) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.180591 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(848ceee3) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.180591 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c0904d74ae94bde834bb39cd509a9be24432b4feca2d7e9585b09dae3
2026-02-02T15:31:51.181590 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 50 bytes successfully. Data preview (hex): 0030878e0f5b08365107b27b46606ac976023f09...
2026-02-02T15:31:51.181590 [FINE] [YamuxStream] [3][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 5ms
2026-02-02T15:31:51.181590 [FINEST] [YamuxStream] [3][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.181590 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c1fe7d5a47b94b179f612523c0ab034291969914cc7677bd6c658ab43
2026-02-02T15:31:51.181590 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(848ceee3) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.182114 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(848ceee3) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 1fe7d5a47b94b179f612523c0ab034291969914cc7677bd6c658ab43
2026-02-02T15:31:51.182114 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.182114 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.182114 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(2a11d9dc) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.182114 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(2a11d9dc) END (from buffer). Returning 28 bytes: 1fe7d5a47b94b179f612523c0ab034291969914cc7677bd6c658ab43. Buffer after: 0 bytes: 
2026-02-02T15:31:51.182114 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [31, 231, 213, 164]
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1fe7d5a47b94b179f612523c0ab034291969914cc7677bd6c658ab43
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1fe7d5a47b94b179f612523c
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 0ab034291969914cc7677bd6c658ab43
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [31, 231, 213, 164]
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [10, 176, 52, 41]
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [10, 176, 52, 41, 25, 105, 145, 76, 199, 103, 123, 214, 198, 88, 171, 67]
2026-02-02T15:31:51.182114 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.182114 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:31:51.183600 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.183600 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.183600 [FINER] [YamuxStream] [3][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.183600 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.183600 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.183600 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.185108 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.185108 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.185108 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(957d6298) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:51.185108 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(957d6298) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 0904d74ae94bde834bb39cd509a9be24432b4feca2d7e9585b09dae3
2026-02-02T15:31:51.185108 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.185108 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.185108 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.185108 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.185108 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.185108 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.185108 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.186631 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(820ee0ac) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.186631 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(820ee0ac) END (from buffer). Returning 28 bytes: 0904d74ae94bde834bb39cd509a9be24432b4feca2d7e9585b09dae3. Buffer after: 0 bytes: 
2026-02-02T15:31:51.187480 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [9, 4, 215, 74]
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 0904d74ae94bde834bb39cd509a9be24432b4feca2d7e9585b09dae3
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 0904d74ae94bde834bb39cd5
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 09a9be24432b4feca2d7e9585b09dae3
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [9, 4, 215, 74]
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [9, 169, 190, 36]
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [9, 169, 190, 36, 67, 43, 79, 236, 162, 215, 233, 88, 91, 9, 218, 227]
2026-02-02T15:31:51.187480 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.187480 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:51.188485 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:51.188485 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.188485 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:51.188485 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.188485 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.188485 [FINER] [YamuxStream] [2][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:51.189524 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030878e0f5b08365107b27b46606ac976023f095094084e65ef178e944aa4752785dd33c1aa760fbe146e3c864326773260
2026-02-02T15:31:51.189524 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.189524 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.189524 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.189524 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.189524 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.189524 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.189524 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.189524 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.189524 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.189524 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(c117cbee) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.189524 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(c117cbee) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.190529 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.190529 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.190529 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.190529 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.191043 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.191043 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.191043 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.191043 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.191043 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.191043 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(ead13e2d) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:51.191043 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(ead13e2d) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 878e0f5b08365107b27b46606ac976023f095094084e65ef178e944aa4752785dd33c1aa760fbe146e3c864326773260
2026-02-02T15:31:51.191556 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:51.191556 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:51.191556 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(a1ddbe1b) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:51.191556 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(a1ddbe1b) END (from buffer). Returning 48 bytes: 878e0f5b08365107b27b46606ac976023f095094084e65ef178e944aa4752785dd33c1aa760fbe146e3c864326773260. Buffer after: 0 bytes: 
2026-02-02T15:31:51.191556 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [135, 142, 15, 91]
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 878e0f5b08365107b27b46606ac976023f095094084e65ef178e944aa4752785dd33c1aa760fbe146e3c864326773260
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 878e0f5b08365107b27b46606ac976023f095094084e65ef178e944aa4752785
2026-02-02T15:31:51.191556 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: dd33c1aa760fbe146e3c864326773260
2026-02-02T15:31:51.192575 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [135, 142, 15, 91]
2026-02-02T15:31:51.192575 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [221, 51, 193, 170]
2026-02-02T15:31:51.192575 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [221, 51, 193, 170, 118, 15, 190, 20, 110, 60, 134, 67, 38, 119, 50, 96]
2026-02-02T15:31:51.192575 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.192575 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:51.192575 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:31:51.192575 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:51.192575 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:51.192575 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.193575 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.193575 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:51.193575 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.193575 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.193575 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.193950 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:51.193950 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:51.193950 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.193950 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:51.193950 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.193950 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:51.193950 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:51.193950 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:51.194455 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.194455 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.194455 [FINE] [YamuxStream] [2][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:51.194455 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:51.194455 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:51.194455 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:51.194455 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:51.194455 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 50 bytes: 0030ca09c696b1d0d49b895e80ee0c0f5d5c232ef0ca5b1137c3532de620386db91f76cd59f380838f561ad74ceb42822b4a
2026-02-02T15:31:51.194455 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 50 bytes successfully. Data preview (hex): 0030ca09c696b1d0d49b895e80ee0c0f5d5c232e...
2026-02-02T15:31:51.194455 [FINE] [YamuxStream] [2][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 0ms
2026-02-02T15:31:51.194455 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:51.194455 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:51.194455 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.196193 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.196193 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.196193 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.196193 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.196193 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.196193 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.196193 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.196193 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.196193 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.197712 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(2a3d0003) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.197712 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(2a3d0003) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.197712 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030ca09c696b1d0d49b895e80ee0c0f5d5c232ef0ca5b1137c3532de620386db91f76cd59f380838f561ad74ceb42822b4a
2026-02-02T15:31:51.197712 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(c117cbee) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.197712 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(c117cbee) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: ca09c696b1d0d49b895e80ee0c0f5d5c232ef0ca5b1137c3532de620386db91f76cd59f380838f561ad74ceb42822b4a
2026-02-02T15:31:51.197712 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:51.197712 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.197712 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:51.197712 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:51.197712 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:51.197712 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:51.197712 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:51.198729 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(5ef5c41c) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:51.198729 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(5ef5c41c) END (from buffer). Returning 48 bytes: ca09c696b1d0d49b895e80ee0c0f5d5c232ef0ca5b1137c3532de620386db91f76cd59f380838f561ad74ceb42822b4a. Buffer after: 0 bytes: 
2026-02-02T15:31:51.198729 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [202, 9, 198, 150]
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: ca09c696b1d0d49b895e80ee0c0f5d5c232ef0ca5b1137c3532de620386db91f76cd59f380838f561ad74ceb42822b4a
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ca09c696b1d0d49b895e80ee0c0f5d5c232ef0ca5b1137c3532de620386db91f
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 76cd59f380838f561ad74ceb42822b4a
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [202, 9, 198, 150]
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [118, 205, 89, 243]
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [118, 205, 89, 243, 128, 131, 143, 86, 26, 215, 76, 235, 66, 130, 43, 74]
2026-02-02T15:31:51.198729 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.198729 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:31:51.199728 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:51.199728 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.199728 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:51.199728 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:51.199728 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.200728 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:51.200728 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.200728 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:51.201232 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:51.201232 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:51.201232 [FINE] [YamuxStream] [3][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:51.201232 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:31:51.201232 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:51.201232 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:31:51.201232 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:31:51.201232 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 53 bytes: 00339c2a1f0ddba76aae1a34114148fb279ab36eb10909dfe3ade431702719129e13e7c09a7d6654a04a38e01df9692f0c68e67a95
2026-02-02T15:31:51.202236 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 53 bytes successfully. Data preview (hex): 00339c2a1f0ddba76aae1a34114148fb279ab36e...
2026-02-02T15:31:51.202236 [FINE] [YamuxStream] [3][Client] StreamID=3 Direct write: Successfully wrote all 23 bytes in 1ms
2026-02-02T15:31:51.202236 [FINEST] [YamuxStream] [3][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.203236 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.203236 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.203236 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.203236 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.203236 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.203236 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.203236 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.203236 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.203236 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.203236 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(78d422b6) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.203236 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(78d422b6) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.204235 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 00339c2a1f0ddba76aae1a34114148fb279ab36eb10909dfe3ade431702719129e13e7c09a7d6654a04a38e01df9692f0c68e67a95
2026-02-02T15:31:51.204235 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(2a3d0003) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.204235 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(2a3d0003) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: 9c2a1f0ddba76aae1a34114148fb279ab36eb10909dfe3ade431702719129e13e7c09a7d6654a04a38e01df9692f0c68e67a95
2026-02-02T15:31:51.204235 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:31:51.204235 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:31:51.204235 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(2b07144e) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:31:51.204235 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(2b07144e) END (from buffer). Returning 51 bytes: 9c2a1f0ddba76aae1a34114148fb279ab36eb10909dfe3ade431702719129e13e7c09a7d6654a04a38e01df9692f0c68e67a95. Buffer after: 0 bytes: 
2026-02-02T15:31:51.204235 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [156, 42, 31, 13]
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: 9c2a1f0ddba76aae1a34114148fb279ab36eb10909dfe3ade431702719129e13e7c09a7d6654a04a38e01df9692f0c68e67a95
2026-02-02T15:31:51.204235 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9c2a1f0ddba76aae1a34114148fb279ab36eb10909dfe3ade431702719129e13e7c09a
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7d6654a04a38e01df9692f0c68e67a95
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [156, 42, 31, 13]
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [125, 102, 84, 160]
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [125, 102, 84, 160, 74, 56, 224, 29, 249, 105, 47, 12, 104, 230, 122, 149]
2026-02-02T15:31:51.205234 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:51.205234 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 35 bytes
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:31:51.205234 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:31:51.205234 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.205234 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.205234 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:31:51.206234 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.206234 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.206234 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.206234 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:31:51.206234 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:31:51.206234 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:31:51.206234 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:31:51.206234 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.206234 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:31:51.206234 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:31:51.206234 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:31:51.206234 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/test/broadcast/1.0.0"
2026-02-02T15:31:51.206234 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/test/broadcast/1.0.0"
2026-02-02T15:31:51.206234 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/test/broadcast/1.0.0". Sending acknowledgment: "/test/broadcast/1.0.0".
2026-02-02T15:31:51.206234 [FINE] [YamuxStream] [2][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:51.207233 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:31:51.207233 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:51.207233 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:31:51.207233 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:31:51.207233 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 53 bytes: 00331805272df1bebe84dcad21722325812c75945549a5fc60ba4d64b04d39844ddf40810e91ddb43409c8382aabb62c94f44e6d59
2026-02-02T15:31:51.207233 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.207233 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.207233 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.208234 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.208234 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.208234 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.208234 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.208234 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.208234 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.208234 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(086b1147) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.208234 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(086b1147) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.208234 [FINEST] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 00331805272df1bebe84dcad21722325812c75945549a5fc60ba4d64b04d39844ddf40810e91ddb43409c8382aabb62c94f44e6d59
2026-02-02T15:31:51.208234 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(78d422b6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.208234 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(78d422b6) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: 1805272df1bebe84dcad21722325812c75945549a5fc60ba4d64b04d39844ddf40810e91ddb43409c8382aabb62c94f44e6d59
2026-02-02T15:31:51.208234 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
00:58 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.208234 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.208234 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.208234 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:31:51.208234 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:31:51.209234 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:31:51.209234 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(5bb767b2) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:31:51.209234 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(5bb767b2) END (from buffer). Returning 51 bytes: 1805272df1bebe84dcad21722325812c75945549a5fc60ba4d64b04d39844ddf40810e91ddb43409c8382aabb62c94f44e6d59. Buffer after: 0 bytes: 
2026-02-02T15:31:51.209234 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [24, 5, 39, 45]
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: 1805272df1bebe84dcad21722325812c75945549a5fc60ba4d64b04d39844ddf40810e91ddb43409c8382aabb62c94f44e6d59
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1805272df1bebe84dcad21722325812c75945549a5fc60ba4d64b04d39844ddf40810e
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 91ddb43409c8382aabb62c94f44e6d59
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [24, 5, 39, 45]
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [145, 221, 180, 52]
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [145, 221, 180, 52, 9, 200, 56, 42, 171, 182, 44, 148, 244, 78, 109, 89]
2026-02-02T15:31:51.209234 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
00:58 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.209234 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.209234 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1058216239): [51, 94, 239, 154, 96, 50, 11, 175, 131, 172, 244, 32, 242, 167, 197, 234, 113, 71, 229, 164, 109, 166, 247, 221, 191, 245, 62, 243, 170, 212, 76, 225]
2026-02-02T15:31:51.210233 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 35 bytes
2026-02-02T15:31:51.210233 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:31:51.210233 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:31:51.210233 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.210233 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.210233 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:31:51.210739 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.210739 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.210739 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.210739 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:31:51.210739 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:31:51.210739 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:31:51.210739 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:31:51.210739 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:58 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.210739 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101: ServerSocket closed.
00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.210739 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:31:51.210739 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:31:51.210739 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:31:51.211743 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /test/broadcast/1.0.0 on stream 3
2026-02-02T15:31:51.211743 [FINE] [YamuxStream] [3][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:31:51.211743 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /test/broadcast/1.0.0 on stream 3...
00:58 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.211743 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4101 connectionStream is done. Removing listener.
00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.211743 [FINE] [StreamScopeImpl] stream-1770067911176-7681: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
00:58 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.211743 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101 already closed.
00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.211743 [FINE] [StreamScopeImpl] stream-1770067911176-7681: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:51.211743 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:31:51.211743 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /test/broadcast/1.0.0
2026-02-02T15:31:51.211743 [FINE] [YamuxStream] [3][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 3 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524245
2026-02-02T15:31:51.212743 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 15, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3, 2, 104, 105])
2026-02-02T15:31:51.212743 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
00:58 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.212743 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101: ConnectionController closed.
00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.212743 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 31 bytes (plaintext was 15)
2026-02-02T15:31:51.212743 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 33
2026-02-02T15:31:51.212743 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 33 bytes: 001f49b6452cb68d2274829b659583fa3d966df6dfe3001800b987ba7de7809066
2026-02-02T15:31:51.213742 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 33 bytes successfully. Data preview (hex): 001f49b6452cb68d2274829b659583fa3d966df6...
00:58 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.213742 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWHVxBZcdEVHmG9vT2zYqwEpwTsT6EFSi8QTA9UNT5W8yN
00:58 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.213742 [FINE] [YamuxStream] [3][Client] StreamID=3 Direct write: Successfully wrote all 3 bytes in 1ms
2026-02-02T15:31:51.213742 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:31:51.213742 [FINE] [YamuxStream] [3][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:31:51.213742 [FINER] [YamuxStream] [3][Client] StreamID=3 Sending pending WINDOW_UPDATE for 43 consumed bytes before local FIN.
2026-02-02T15:31:51.213742 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43])
2026-02-02T15:31:51.213742 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:31:51.214743 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.214743 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.214743 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001cebe9234117abbc60524788e956c51638f17dd93d5287828f408e9ce2
2026-02-02T15:31:51.214743 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 53 bytes successfully. Data preview (hex): 00331805272df1bebe84dcad21722325812c7594...
2026-02-02T15:31:51.214743 [FINE] [YamuxStream] [2][Server] StreamID=3 Direct write: Successfully wrote all 23 bytes in 7ms
2026-02-02T15:31:51.214743 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/test/broadcast/1.0.0".
2026-02-02T15:31:51.215479 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/test/broadcast/1.0.0" and its handler.
2026-02-02T15:31:51.215479 [FINE] [multistream] [multistreamMuxer - handle] Protocol /test/broadcast/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:51.215479 [FINE] [StreamScopeImpl] stream-1770067911179-9914: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:51.215479 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/broadcast/1.0.0
2026-02-02T15:31:51.215479 [FINE] [StreamScopeImpl] stream-1770067911179-9914: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:51.215479 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /test/broadcast/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:51.215479 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.215479 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.215479 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.215479 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.215479 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.215479 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.216482 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.216482 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.216482 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.216482 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.216482 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(9c5d429e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.216482 [FINER] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Read(9c5d429e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.216482 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (63 bytes): 001f49b6452cb68d2274829b659583fa3d966df6dfe3001800b987ba7de7809066001cebe9234117abbc60524788e956c51638f17dd93d5287828f408e9ce2
2026-02-02T15:31:51.216482 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(086b1147) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.216482 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(086b1147) END (from buffer). Returning 2 bytes: 001f. Buffer after: 61 bytes: 49b6452cb68d2274829b659583fa3d966df6dfe3001800b987ba7de7809066001cebe9234117abbc60524788e956c51638f17dd93d5287828f408e9ce2
2026-02-02T15:31:51.216482 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 31]
2026-02-02T15:31:51.216482 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.216482 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 31]
2026-02-02T15:31:51.216482 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001f
2026-02-02T15:31:51.216482 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 31
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 31
2026-02-02T15:31:51.217482 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 31 more bytes (have 0/31)
2026-02-02T15:31:51.217482 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f5fc126a) START. Requested: 31. Buffer: 61 bytes.
2026-02-02T15:31:51.217482 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(f5fc126a) END (from buffer). Returning 31 bytes: 49b6452cb68d2274829b659583fa3d966df6dfe3001800b987ba7de7809066. Buffer after: 30 bytes: 001cebe9234117abbc60524788e956c51638f17dd93d5287828f408e9ce2
2026-02-02T15:31:51.217482 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 31 bytes. First 4 bytes: [73, 182, 69, 44]
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 31, Got: 31
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 31, Bytes: 49b6452cb68d2274829b659583fa3d966df6dfe3001800b987ba7de7809066
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 31
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(15) and MAC(16)
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 49b6452cb68d2274829b659583fa3d
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 966df6dfe3001800b987ba7de7809066
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [73, 182, 69, 44]
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [150, 109, 246, 223]
2026-02-02T15:31:51.217482 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [150, 109, 246, 223, 227, 0, 24, 0, 185, 135, 186, 125, 231, 128, 144, 102]
2026-02-02T15:31:51.217482 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.218733 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:51.218733 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 15 bytes
2026-02-02T15:31:51.218733 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 15 bytes to _decryptedBuffer. New _decryptedBuffer.length: 15
2026-02-02T15:31:51.218733 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 3. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3]
2026-02-02T15:31:51.218733 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=3
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=3
2026-02-02T15:31:51.219734 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 3, _decryptedBuffer.length: 3
2026-02-02T15:31:51.219734 [FINER] [SecuredConnection] SecuredConnection.read (length=3): Returning 3 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [2, 104, 105]
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=3
2026-02-02T15:31:51.219734 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.222236 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 3, flags: 0
2026-02-02T15:31:51.222236 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 3 bytes directly to waiting reader
2026-02-02T15:31:51.222236 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 46
2026-02-02T15:31:51.223253 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:51.223253 [FINEST] [YamuxStream] [2][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:31:51.223253 [FINEST] [YamuxStream] [2][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:31:51.224253 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:51.224253 [FINEST] [YamuxStream] [2][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:31:51.224253 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001cebe9234117abbc60524788e956c51638f17d...
2026-02-02T15:31:51.225758 [FINER] [YamuxStream] [3][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:51.226297 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:51.226297 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:31:51.226297 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.226297 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.226297 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001cd36d96d8ad0a47e29a4f80b520571cf1132f5296caab8a4fa2d5f222
2026-02-02T15:31:51.226297 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001cd36d96d8ad0a47e29a4f80b520571cf1132f...
2026-02-02T15:31:51.226297 [FINER] [YamuxStream] [3][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:31:51.226297 [FINER] [YamuxStream] [3][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:51.226297 [FINER] [YamuxStream] [3][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:51.226297 [FINER] [YamuxStream] [3][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:51.226297 [FINE] [YamuxStream] [3][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.226297 [FINE] [YamuxStream] [3][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.226297 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:31:51.228013 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:31:51.228013 [FINE] [Libp2pRouter] [VERBOSE] Message sent successfully to 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
2026-02-02T15:31:51.228013 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:51.228013 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:51.228013 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:51.228531 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:51.228531 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:51.228531 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:51.228531 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:51.228531 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:51.228531 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:51.229535 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:51.229535 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:51.229535 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:51.229535 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:51.229535 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:51.230040 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:51.230040 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:51.230524 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:51.230524 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should send and receive messages
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.231942 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:51.232948 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:51.232948 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:51.232948 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:51.232948 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:51.232948 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:51.232948 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:51.232948 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:51.234463 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cd36d96d8ad0a47e29a4f80b520571cf1132f5296caab8a4fa2d5f222
2026-02-02T15:31:51.234463 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.234463 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.234463 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.234463 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.234463 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.234463 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.234463 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.234463 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.234463 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.234463 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(59e683bc) START. Requested: 2. Buffer: 60 bytes.
2026-02-02T15:31:51.234463 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(59e683bc) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: ebe9234117abbc60524788e956c51638f17dd93d5287828f408e9ce2001cd36d96d8ad0a47e29a4f80b520571cf1132f5296caab8a4fa2d5f222
2026-02-02T15:31:51.234463 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.234463 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.234463 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.235466 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.235466 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(791aa199) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:31:51.235466 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(791aa199) END (from buffer). Returning 28 bytes: ebe9234117abbc60524788e956c51638f17dd93d5287828f408e9ce2. Buffer after: 30 bytes: 001cd36d96d8ad0a47e29a4f80b520571cf1132f5296caab8a4fa2d5f222
2026-02-02T15:31:51.235466 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [235, 233, 35, 65]
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: ebe9234117abbc60524788e956c51638f17dd93d5287828f408e9ce2
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ebe9234117abbc60524788e9
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 56c51638f17dd93d5287828f408e9ce2
2026-02-02T15:31:51.235466 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [235, 233, 35, 65]
2026-02-02T15:31:51.235970 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [86, 197, 22, 56]
2026-02-02T15:31:51.235970 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [86, 197, 22, 56, 241, 125, 217, 61, 82, 135, 130, 143, 64, 142, 156, 226]
2026-02-02T15:31:51.235970 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.235970 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:51.235970 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:31:51.235970 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.235970 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43]
2026-02-02T15:31:51.235970 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.235970 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.236974 [FINER] [YamuxStream] [2][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 43. Current our send window: 524245, New: 524288
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.237489 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(24341833) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:51.237489 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(24341833) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: d36d96d8ad0a47e29a4f80b520571cf1132f5296caab8a4fa2d5f222
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.237489 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(bb053cb6) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.237489 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(bb053cb6) END (from buffer). Returning 28 bytes: d36d96d8ad0a47e29a4f80b520571cf1132f5296caab8a4fa2d5f222. Buffer after: 0 bytes: 
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [211, 109, 150, 216]
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: d36d96d8ad0a47e29a4f80b520571cf1132f5296caab8a4fa2d5f222
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d36d96d8ad0a47e29a4f80b5
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 20571cf1132f5296caab8a4fa2d5f222
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [211, 109, 150, 216]
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [32, 87, 28, 241]
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [32, 87, 28, 241, 19, 47, 82, 150, 202, 171, 138, 79, 162, 213, 242, 34]
2026-02-02T15:31:51.237489 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.237489 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:51.239002 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:31:51.239002 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.239002 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:51.239002 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.239002 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.239002 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:51.239002 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:51.239002 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:31:51.241016 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:51.241016 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:51.242523 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:51.242523 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:51.242523 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:51.244025 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:51.244560 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.244560 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - Initial _network.listenAddresses: []
2026-02-02T15:31:51.244560 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, Host hashCode: 891096043
2026-02-02T15:31:51.245567 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.245567 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.245567 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:51.245567 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:51.245567 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:51.246071 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:51.246071 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.246071 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.246071 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.246071 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.247575 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.247575 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.247575 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.247575 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.247575 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.247575 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(556faf43) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.247575 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(556faf43) ASYNC WAIT. Requested: 2. Buffer: 0
00:59 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.545783 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4102: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4102 for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.545783 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4102 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4102
2026-02-02T15:31:51.545783 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz.
2026-02-02T15:31:51.546301 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.546301 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:31:51.546301 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.546301 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:51.546301 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.546301 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:31:51.546301 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:51.546301 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.546301 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.546301 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:51.546301 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
2026-02-02T15:31:51.552932 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:51.552932 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.552932 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 101608061, network.listenAddresses: []
2026-02-02T15:31:51.555491 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:51.555491 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, Host hashCode: 682905032
2026-02-02T15:31:51.555491 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.556008 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.556008 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:51.556008 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.556008 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:51.556008 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:51.556008 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, Host hashCode: 682905032
2026-02-02T15:31:51.556008 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.557011 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.557011 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:51.557011 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.558526 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:51.558526 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:51.558526 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:51.558526 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.559526 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 101608061, network.listenAddresses: []
2026-02-02T15:31:51.559526 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.559526 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 101608061, network.listenAddresses: []
2026-02-02T15:31:51.559526 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.560526 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:51.561032 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, Host hashCode: 682905032
2026-02-02T15:31:51.561032 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.561032 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.561032 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:51.561032 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.561032 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.562037 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.562037 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 101608061, network.listenAddresses: []
2026-02-02T15:31:51.562037 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:51.562037 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:51.562037 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 101608061, network.listenAddresses: []
2026-02-02T15:31:51.562037 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:31:51.562037 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:51.562037 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4102 with ID: 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.562037 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:51.563546 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:51.563546 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:51.563546 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:51.563546 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:51.564564 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:51.564564 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:31:51.564564 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:51.564564 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:51.564564 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:51.565068 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:51.565068 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:51.565068 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:51.565068 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:51.565068 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.566366 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.566366 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.566366 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.566366 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:51.566366 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.566366 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:51.567394 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:51.567394 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:51.567394 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:51.567394 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:51.567394 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:51.568392 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:51.568392 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:51.568392 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.568392 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.568392 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 0ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.568392 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 0ms (dial: 0ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.569614 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:51.569614 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.569614 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:51.570615 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:51.570615 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:51.570615 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:51.570615 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:51.570615 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:51.571613 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:51.571613 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:51.571613 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.571613 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.571613 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 0ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.572617 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 3ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.572617 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:51.572617 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.572617 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:51.572617 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:51.572617 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:51.572617 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:51.574082 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:51.574082 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:51.574082 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:51.574082 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:51.574082 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.574082 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.574082 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.575587 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:51.575587 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:51.575587 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:51.575587 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4102/p2p/12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.576679 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, existing_conns=0
2026-02-02T15:31:51.576679 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz"
2026-02-02T15:31:51.576679 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz"
2026-02-02T15:31:51.576679 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Dialing.
2026-02-02T15:31:51.576679 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:51.577677 [FINE] [Swarm] Dialing 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:51.578183 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4102 (priority 1)
2026-02-02T15:31:51.578183 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:51.585938 [FINE] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4102, Socket Remote: 127.0.0.1:58547
2026-02-02T15:31:51.586958 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067911585-8985
2026-02-02T15:31:51.587957 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:51.587957 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(532bc6dd) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:51.587957 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(532bc6dd) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:51.594599 [FINE] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58547, Socket Remote: 127.0.0.1:4102
2026-02-02T15:31:51.596309 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067911596-539
2026-02-02T15:31:51.596309 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWNTFUjTQGagWD6MH4AS2G5ChYPysWxU6UVb4x6pn8qDes
2026-02-02T15:31:51.596309 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:51.596309 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:51.597857 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(532bc6dd) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.597857 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(532bc6dd) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:51.597857 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.597857 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.597857 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:51.597857 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:51.597857 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:51.597857 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:51.597857 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ee31b6a8) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:51.597857 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ee31b6a8) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:51.597857 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:51.597857 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(e60c937a) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:51.597857 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(e60c937a) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:51.599374 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:51.599374 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(e60c937a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.599374 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(e60c937a) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:51.599374 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:51.599374 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:51.599374 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ee31b6a8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.600391 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ee31b6a8) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:51.600391 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:51.600391 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:51.600391 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:51.600391 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:51.600391 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:51.601390 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(5ec8ba2c) START. Requested: null. Buffer: 0 bytes.
00:59 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.601390 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
00:59 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.601390 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(5ec8ba2c) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:51.601390 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:51.601390 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(5ec8ba2c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.601895 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(5ec8ba2c) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:51.606419 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:51.606419 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 34 bytes: 0020f116ee2e9f973cc6415976f83b685d07d88b513fdde48b41b5606e607c65725d
2026-02-02T15:31:51.607424 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 34 bytes successfully. Data preview (hex): 0020f116ee2e9f973cc6415976f83b685d07d88b...
2026-02-02T15:31:51.607424 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(8c6fdc2b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.607424 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(8c6fdc2b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.607883 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:51.607883 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:51.607883 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:51.607883 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:51.607883 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:51.611978 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(7d1ad5e8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.611978 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(7d1ad5e8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.611978 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 0020f116ee2e9f973cc6415976f83b685d07d88b513fdde48b41b5606e607c65725d
2026-02-02T15:31:51.611978 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(7d1ad5e8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.611978 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(7d1ad5e8) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: f116ee2e9f973cc6415976f83b685d07d88b513fdde48b41b5606e607c65725d
2026-02-02T15:31:51.611978 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(4c26c7f2) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:51.611978 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(4c26c7f2) END (from buffer). Returning 32 bytes: f116ee2e9f973cc6415976f83b685d07d88b513fdde48b41b5606e607c65725d. Buffer after: 0 bytes: 
2026-02-02T15:31:51.611978 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:51.622953 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:51.622953 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 202 bytes: 00c8d947128e247777e9b0a28d2f0a6b8951dc49db9895e3698e4301644cd00041095b4601198e10f963f337d979b9bcbf57bf7d8ef17e2667a9208d01106dc528328eb13ef32c77d701b437efbbe4db338cb51084e8091b87603063f1b49c2a9dee64aeb029799331fe35eaf77d214f13c6655fb8fc64c1092e450ee667c25ef776f4498ea8d350252c6a47948d7e6648c428cfdc97a844133415e512247f41a870537aae6d200848f843bd2371691314df7089fa824b979af4ad527d52973f785a6716f1ce28997ce1
2026-02-02T15:31:51.622953 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 202 bytes successfully. Data preview (hex): 00c8d947128e247777e9b0a28d2f0a6b8951dc49...
2026-02-02T15:31:51.623965 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(702a8e2e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.623965 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(702a8e2e) ASYNC WAIT. Requested: 2. Buffer: 0
00:59 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.623965 [FINE] [ambient_autonat_v2] Probe generation 2 cancelled (current: 4)
00:59 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:51.623965 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c8d947128e247777e9b0a28d2f0a6b8951dc49db9895e3698e4301644cd00041095b4601198e10f963f337d979b9bcbf57bf7d8ef17e2667a9208d01106dc528328eb13ef32c77d701b437efbbe4db338cb51084e8091b87603063f1b49c2a9dee64aeb029799331fe35eaf77d214f13c6655fb8fc64c1092e450ee667c25ef776f4498ea8d350252c6a47948d7e6648c428cfdc97a844133415e512247f41a870537aae6d200848f843bd2371691314df7089fa824b979af4ad527d52973f785a6716f1ce28997ce1
2026-02-02T15:31:51.623965 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(8c6fdc2b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.623965 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(8c6fdc2b) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: d947128e247777e9b0a28d2f0a6b8951dc49db9895e3698e4301644cd00041095b4601198e10f963f337d979b9bcbf57bf7d8ef17e2667a9208d01106dc528328eb13ef32c77d701b437efbbe4db338cb51084e8091b87603063f1b49c2a9dee64aeb029799331fe35eaf77d214f13c6655fb8fc64c1092e450ee667c25ef776f4498ea8d350252c6a47948d7e6648c428cfdc97a844133415e512247f41a870537aae6d200848f843bd2371691314df7089fa824b979af4ad527d52973f785a6716f1ce28997ce1
2026-02-02T15:31:51.623965 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(b7b5d788) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:31:51.623965 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(b7b5d788) END (from buffer). Returning 200 bytes: d947128e247777e9b0a28d2f0a6b8951dc49db9895e3698e4301644cd00041095b4601198e10f963f337d979b9bcbf57bf7d8ef17e2667a9208d01106dc528328eb13ef32c77d701b437efbbe4db338cb51084e8091b87603063f1b49c2a9dee64aeb029799331fe35eaf77d214f13c6655fb8fc64c1092e450ee667c25ef776f4498ea8d350252c6a47948d7e6648c428cfdc97a844133415e512247f41a870537aae6d200848f843bd2371691314df7089fa824b979af4ad527d52973f785a6716f1ce28997ce1. Buffer after: 0 bytes: 
2026-02-02T15:31:51.623965 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:31:51.644396 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:51.644396 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 170 bytes: 00a8f070f94fb80801954711426fe0b8546c425a8890e965a1c2118854b8f58f5d2d4d9863d5eebdf7d8c56d527c493879f644c0fc4ebedb427bf50e33b9e78207f59fe85927b2ab4ceba9ac4c718551e08a61d88e4d208c3c7700f604fbe0775272ed67d94ec7b117b1b909ac96ff38898d923d8d32f26d1ef874df68d9d053277a83f7088e6d1017c3927222e3a591552e7fe2a85af37a68ec833bda1ed5ae04a3008b1355f1e8d1ee
2026-02-02T15:31:51.645960 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 170 bytes successfully. Data preview (hex): 00a8f070f94fb80801954711426fe0b8546c425a...
2026-02-02T15:31:51.645960 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.645960 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:51.645960 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059387928
2026-02-02T15:31:51.645960 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1061996872
2026-02-02T15:31:51.647479 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.647479 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.647479 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:51.647479 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:51.647479 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:51.647479 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:51.647479 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 38 bytes: 0024e46d00d8e55e3b9d301eaa11f3688a211aea5a1d2ec4c500f2899ae228f52064dbab6e5e
2026-02-02T15:31:51.648484 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (170 bytes): 00a8f070f94fb80801954711426fe0b8546c425a8890e965a1c2118854b8f58f5d2d4d9863d5eebdf7d8c56d527c493879f644c0fc4ebedb427bf50e33b9e78207f59fe85927b2ab4ceba9ac4c718551e08a61d88e4d208c3c7700f604fbe0775272ed67d94ec7b117b1b909ac96ff38898d923d8d32f26d1ef874df68d9d053277a83f7088e6d1017c3927222e3a591552e7fe2a85af37a68ec833bda1ed5ae04a3008b1355f1e8d1ee
2026-02-02T15:31:51.648989 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(702a8e2e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.648989 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(702a8e2e) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 168 bytes: f070f94fb80801954711426fe0b8546c425a8890e965a1c2118854b8f58f5d2d4d9863d5eebdf7d8c56d527c493879f644c0fc4ebedb427bf50e33b9e78207f59fe85927b2ab4ceba9ac4c718551e08a61d88e4d208c3c7700f604fbe0775272ed67d94ec7b117b1b909ac96ff38898d923d8d32f26d1ef874df68d9d053277a83f7088e6d1017c3927222e3a591552e7fe2a85af37a68ec833bda1ed5ae04a3008b1355f1e8d1ee
2026-02-02T15:31:51.648989 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(69e578cc) START. Requested: 168. Buffer: 168 bytes.
2026-02-02T15:31:51.648989 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(69e578cc) END (from buffer). Returning 168 bytes: f070f94fb80801954711426fe0b8546c425a8890e965a1c2118854b8f58f5d2d4d9863d5eebdf7d8c56d527c493879f644c0fc4ebedb427bf50e33b9e78207f59fe85927b2ab4ceba9ac4c718551e08a61d88e4d208c3c7700f604fbe0775272ed67d94ec7b117b1b909ac96ff38898d923d8d32f26d1ef874df68d9d053277a83f7088e6d1017c3927222e3a591552e7fe2a85af37a68ec833bda1ed5ae04a3008b1355f1e8d1ee. Buffer after: 0 bytes: 
2026-02-02T15:31:51.649992 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:51.666910 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.667211 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:51.667211 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1061996872
2026-02-02T15:31:51.667715 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059387928
2026-02-02T15:31:51.667715 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:51.667715 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:51.667715 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.667715 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.667715 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.668726 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.668726 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.668726 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:51.668726 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:51.668726 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.668726 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.669726 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(4ccb96cf) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.669726 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(4ccb96cf) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.669726 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 38 bytes successfully. Data preview (hex): 0024e46d00d8e55e3b9d301eaa11f3688a211aea...
2026-02-02T15:31:51.670728 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:51.670728 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.670728 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.670728 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.670728 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:51.670728 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:51.671379 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.671379 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.671379 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(810116ad) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.671968 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(810116ad) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.671968 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024e46d00d8e55e3b9d301eaa11f3688a211aea5a1d2ec4c500f2899ae228f52064dbab6e5e
2026-02-02T15:31:51.671968 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(4ccb96cf) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.672481 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(4ccb96cf) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: e46d00d8e55e3b9d301eaa11f3688a211aea5a1d2ec4c500f2899ae228f52064dbab6e5e
2026-02-02T15:31:51.672481 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:51.672481 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.672481 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:51.672481 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:51.672481 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:51.672481 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:51.672481 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:51.672481 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(c6228d37) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:51.672481 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(c6228d37) END (from buffer). Returning 36 bytes: e46d00d8e55e3b9d301eaa11f3688a211aea5a1d2ec4c500f2899ae228f52064dbab6e5e. Buffer after: 0 bytes: 
2026-02-02T15:31:51.672481 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [228, 109, 0, 216]
2026-02-02T15:31:51.672481 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: e46d00d8e55e3b9d301eaa11f3688a211aea5a1d2ec4c500f2899ae228f52064dbab6e5e
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e46d00d8e55e3b9d301eaa11f3688a211aea5a1d
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2ec4c500f2899ae228f52064dbab6e5e
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [228, 109, 0, 216]
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [46, 196, 197, 0]
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [46, 196, 197, 0, 242, 137, 154, 226, 40, 245, 32, 100, 219, 171, 110, 94]
2026-02-02T15:31:51.673533 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.673533 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059387928): [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.674532 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:51.674532 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.674532 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:51.674532 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.675066 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.675066 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.675066 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:51.675066 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:51.675695 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:51.675695 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:51.675695 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 38 bytes: 0024cb9aaf44f3acc35c82e797eaa430134279b3903fcb3ec144b7b0ba685be47aa23c982de9
2026-02-02T15:31:51.676203 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024cb9aaf44f3acc35c82e797eaa430134279b3903fcb3ec144b7b0ba685be47aa23c982de9
2026-02-02T15:31:51.676203 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(810116ad) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.676203 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(810116ad) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: cb9aaf44f3acc35c82e797eaa430134279b3903fcb3ec144b7b0ba685be47aa23c982de9
2026-02-02T15:31:51.676203 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:51.676203 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.676203 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:51.676203 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:51.676203 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:51.676203 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:51.676203 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:51.676203 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(67bdf86c) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:51.676203 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(67bdf86c) END (from buffer). Returning 36 bytes: cb9aaf44f3acc35c82e797eaa430134279b3903fcb3ec144b7b0ba685be47aa23c982de9. Buffer after: 0 bytes: 
2026-02-02T15:31:51.676203 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [203, 154, 175, 68]
2026-02-02T15:31:51.676203 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:51.677714 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: cb9aaf44f3acc35c82e797eaa430134279b3903fcb3ec144b7b0ba685be47aa23c982de9
2026-02-02T15:31:51.677714 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:51.677714 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:51.677714 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: cb9aaf44f3acc35c82e797eaa430134279b3903f
2026-02-02T15:31:51.677714 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: cb3ec144b7b0ba685be47aa23c982de9
2026-02-02T15:31:51.677714 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [203, 154, 175, 68]
2026-02-02T15:31:51.678718 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [203, 62, 193, 68]
2026-02-02T15:31:51.678718 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [203, 62, 193, 68, 183, 176, 186, 104, 91, 228, 122, 162, 60, 152, 45, 233]
2026-02-02T15:31:51.678718 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.678718 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.679224 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:51.679224 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.679224 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:51.679224 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.679224 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:51.679224 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:51.680229 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:51.680229 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:51.680229 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 32 bytes: 001ed95231a3720d615e87d3eec79aafc9b30fbc220b7dc713b2ea19995c7df0
2026-02-02T15:31:51.680682 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 38 bytes successfully. Data preview (hex): 0024cb9aaf44f3acc35c82e797eaa430134279b3...
2026-02-02T15:31:51.681191 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:51.681191 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:51.681191 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:51.681191 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.681191 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.681191 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.681191 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:51.681191 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:51.682203 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.682203 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.682203 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ebfb07ab) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.682203 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ebfb07ab) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.682203 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001ed95231a3720d615e87d3eec79aafc9b30fbc220b7dc713b2ea19995c7df0
2026-02-02T15:31:51.682203 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ebfb07ab) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.682203 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(ebfb07ab) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: d95231a3720d615e87d3eec79aafc9b30fbc220b7dc713b2ea19995c7df0
2026-02-02T15:31:51.682203 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:51.683508 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:51.683508 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(8957bdaf) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:51.683508 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(8957bdaf) END (from buffer). Returning 30 bytes: d95231a3720d615e87d3eec79aafc9b30fbc220b7dc713b2ea19995c7df0. Buffer after: 0 bytes: 
2026-02-02T15:31:51.683508 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [217, 82, 49, 163]
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: d95231a3720d615e87d3eec79aafc9b30fbc220b7dc713b2ea19995c7df0
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d95231a3720d615e87d3eec79aaf
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c9b30fbc220b7dc713b2ea19995c7df0
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [217, 82, 49, 163]
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [201, 179, 15, 188]
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [201, 179, 15, 188, 34, 11, 125, 199, 19, 178, 234, 25, 153, 92, 125, 240]
2026-02-02T15:31:51.683508 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.683508 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059387928): [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.685013 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:51.685013 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.685013 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:51.685013 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.685013 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:51.685013 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:51.685013 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:51.685013 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:51.685013 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:51.686078 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:51.686078 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:51.686078 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 32 bytes: 001e271f237614dc2a590c71fa96a41f470129580e865e8f62e87d42ce1ac381
2026-02-02T15:31:51.686078 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 32 bytes successfully. Data preview (hex): 001e271f237614dc2a590c71fa96a41f47012958...
2026-02-02T15:31:51.686078 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:51.687585 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:51.687585 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:51.687585 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:51.687585 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.687585 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067911687-8985
2026-02-02T15:31:51.688713 [FINE] [SwarmConn] SwarmConn (1): Setting up health monitoring for connection to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.688713 [FINE] [SwarmConn] SwarmConn (1): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:51.688713 [FINE] [SwarmConn] SwarmConn (1): Context set: d76a15c9-4b37-48c2-9f08-e50980f19bdd
2026-02-02T15:31:51.688713 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, conn_id=1
2026-02-02T15:31:51.688713 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc": 1
2026-02-02T15:31:51.688713 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Conn ID: 1, Direction: Direction.inbound
2026-02-02T15:31:51.688713 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.688713 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Conn ID: 1
2026-02-02T15:31:51.688713 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.688713 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.688713 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.689717 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:51.689717 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 32 bytes successfully. Data preview (hex): 001ed95231a3720d615e87d3eec79aafc9b30fbc...
2026-02-02T15:31:51.689717 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:51.689717 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.689717 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.690723 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.690723 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:51.690723 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:51.690723 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.690723 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.690723 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(18d6ea4a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.691229 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(18d6ea4a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.691229 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e271f237614dc2a590c71fa96a41f470129580e865e8f62e87d42ce1ac381
2026-02-02T15:31:51.691229 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(18d6ea4a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.691229 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(18d6ea4a) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 271f237614dc2a590c71fa96a41f470129580e865e8f62e87d42ce1ac381
2026-02-02T15:31:51.691229 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:51.691229 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.692017 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:51.692017 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:51.692017 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:51.692017 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:51.692017 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:51.692017 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(655894d9) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:51.692017 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(655894d9) END (from buffer). Returning 30 bytes: 271f237614dc2a590c71fa96a41f470129580e865e8f62e87d42ce1ac381. Buffer after: 0 bytes: 
2026-02-02T15:31:51.692017 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [39, 31, 35, 118]
2026-02-02T15:31:51.692017 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 271f237614dc2a590c71fa96a41f470129580e865e8f62e87d42ce1ac381
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 271f237614dc2a590c71fa96a41f
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 470129580e865e8f62e87d42ce1ac381
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [39, 31, 35, 118]
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [71, 1, 41, 88]
2026-02-02T15:31:51.693091 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [71, 1, 41, 88, 14, 134, 94, 143, 98, 232, 125, 66, 206, 26, 195, 129]
2026-02-02T15:31:51.693091 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.694090 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.694594 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:51.694594 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.694594 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:51.694594 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.695605 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.695605 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:51.695605 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:51.696111 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.696111 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067911696-539
2026-02-02T15:31:51.696111 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.696111 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:51.696111 [FINE] [SwarmConn] SwarmConn (0): Context set: ca0f0f0e-5c73-4904-881f-773892fc34fd
2026-02-02T15:31:51.696111 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz: 117ms
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.696111 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.696111 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.696111 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.696111 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(1387875a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.696111 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(1387875a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.696111 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.697614 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.697614 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.697614 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.697614 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.697614 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.697614 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.697614 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.697614 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(ae83c714) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.697614 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(ae83c714) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.721070 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:31:51.722572 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.722572 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 0
2026-02-02T15:31:51.723576 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.723576 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.723576 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:51.723576 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Context HashCode: 266464420
2026-02-02T15:31:51.723576 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:51.723576 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:51.723576 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:51.723576 [FINE] [YamuxStream] [3][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:51.725083 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.725083 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:51.725083 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:51.725083 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Conn ID: 0
2026-02-02T15:31:51.725083 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.725083 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.725083 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 30 bytes: 001c6bde637f6ca24731a5ac412849fa7b69be362a4e59727492dadeb100
2026-02-02T15:31:51.726609 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c6bde637f6ca24731a5ac412849fa7b69be362a4e59727492dadeb100
2026-02-02T15:31:51.726609 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(1387875a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.726609 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(1387875a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 6bde637f6ca24731a5ac412849fa7b69be362a4e59727492dadeb100
2026-02-02T15:31:51.726609 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.726609 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.726609 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.726609 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.726609 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.726609 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.726609 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.727628 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(985e8036) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.727628 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(985e8036) END (from buffer). Returning 28 bytes: 6bde637f6ca24731a5ac412849fa7b69be362a4e59727492dadeb100. Buffer after: 0 bytes: 
2026-02-02T15:31:51.727628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [107, 222, 99, 127]
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 6bde637f6ca24731a5ac412849fa7b69be362a4e59727492dadeb100
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 6bde637f6ca24731a5ac4128
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 49fa7b69be362a4e59727492dadeb100
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [107, 222, 99, 127]
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [73, 250, 123, 105]
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [73, 250, 123, 105, 190, 54, 42, 78, 89, 114, 116, 146, 218, 222, 177, 0]
2026-02-02T15:31:51.727628 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.727628 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059387928): [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.728664 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:51.728664 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.728664 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:51.728664 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.728664 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.729176 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:51.729176 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:51.729689 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.729689 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.729689 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 30 bytes: 001c229ac9aa8c6402daa8de9abb7219bc93ef393039b879800725871515
2026-02-02T15:31:51.729689 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 30 bytes successfully. Data preview (hex): 001c229ac9aa8c6402daa8de9abb7219bc93ef39...
2026-02-02T15:31:51.730693 [FINE] [YamuxStream] [2][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:51.730693 [FINER] [YamuxStream] [2][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:51.731198 [FINE] [YamuxStream] [2][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:51.731198 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:51.731198 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:51.731198 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.731198 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.732201 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 30 bytes: 001cc21506a0c2a55e0216838e8d6bd8e87b59786f5d1507ef95521f1a1e
2026-02-02T15:31:51.732551 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 30 bytes successfully. Data preview (hex): 001c6bde637f6ca24731a5ac412849fa7b69be36...
2026-02-02T15:31:51.732551 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c229ac9aa8c6402daa8de9abb7219bc93ef393039b879800725871515
2026-02-02T15:31:51.732551 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(ae83c714) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.732551 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(ae83c714) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 229ac9aa8c6402daa8de9abb7219bc93ef393039b879800725871515
2026-02-02T15:31:51.732551 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.732551 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.732551 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.732551 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.732551 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.732551 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.732551 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.732551 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(d6384d5c) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.733558 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(d6384d5c) END (from buffer). Returning 28 bytes: 229ac9aa8c6402daa8de9abb7219bc93ef393039b879800725871515. Buffer after: 0 bytes: 
2026-02-02T15:31:51.733558 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [34, 154, 201, 170]
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 229ac9aa8c6402daa8de9abb7219bc93ef393039b879800725871515
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 229ac9aa8c6402daa8de9abb
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7219bc93ef393039b879800725871515
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [34, 154, 201, 170]
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [114, 25, 188, 147]
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [114, 25, 188, 147, 239, 57, 48, 57, 184, 121, 128, 7, 37, 135, 21, 21]
2026-02-02T15:31:51.733558 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.733558 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:51.733558 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.733558 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.733558 [FINER] [YamuxStream] [3][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:51.733558 [FINER] [YamuxStream] [3][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:51.733558 [FINE] [YamuxStream] [3][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:51.733558 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:51.733558 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:51.735064 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.735064 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.735064 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 30 bytes: 001c992ceced28dc1a3176efa3d0b7b7425686398d170b007bb77463e7a2
2026-02-02T15:31:51.735064 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 30 bytes successfully. Data preview (hex): 001cc21506a0c2a55e0216838e8d6bd8e87b5978...
2026-02-02T15:31:51.735064 [FINER] [YamuxStream] [2][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:51.735064 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc on conn 1
2026-02-02T15:31:51.735064 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067911735-7672 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.735064 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:51.735064 [FINEST] [YamuxStream] [2][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.736160 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc21506a0c2a55e0216838e8d6bd8e87b59786f5d1507ef95521f1a1e
2026-02-02T15:31:51.736160 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.736160 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.736723 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.736723 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.736723 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.736723 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.736723 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.736723 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.736723 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.736723 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(edb177af) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:51.736723 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(edb177af) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c21506a0c2a55e0216838e8d6bd8e87b59786f5d1507ef95521f1a1e
2026-02-02T15:31:51.737730 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.737730 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.737730 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.737730 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.737730 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.738236 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.738236 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(cf4583c0) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.738236 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(cf4583c0) END (from buffer). Returning 28 bytes: c21506a0c2a55e0216838e8d6bd8e87b59786f5d1507ef95521f1a1e. Buffer after: 0 bytes: 
2026-02-02T15:31:51.738236 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [194, 21, 6, 160]
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c21506a0c2a55e0216838e8d6bd8e87b59786f5d1507ef95521f1a1e
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c21506a0c2a55e0216838e8d
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 6bd8e87b59786f5d1507ef95521f1a1e
2026-02-02T15:31:51.738236 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [194, 21, 6, 160]
2026-02-02T15:31:51.739242 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [107, 216, 232, 123]
2026-02-02T15:31:51.739242 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [107, 216, 232, 123, 89, 120, 111, 93, 21, 7, 239, 149, 82, 31, 26, 30]
2026-02-02T15:31:51.739761 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.739761 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.739761 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:51.739761 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.739761 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:51.739761 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.739761 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.739761 [FINER] [YamuxStream] [3][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:51.740767 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c992ceced28dc1a3176efa3d0b7b7425686398d170b007bb77463e7a2
2026-02-02T15:31:51.740767 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 30 bytes successfully. Data preview (hex): 001c992ceced28dc1a3176efa3d0b7b742568639...
2026-02-02T15:31:51.741272 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:51.741272 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:51.741272 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067911741-7693 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.741272 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:51.741777 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:51.741777 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0, duration=18ms
2026-02-02T15:31:51.741777 [FINE] [YamuxStream] [3][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:21.741777
2026-02-02T15:31:51.741777 [FINE] [YamuxStream] [3][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:51.742217 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.742217 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:51.742217 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:51.742217 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:51.742217 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:51.743220 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:51.743220 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 50 bytes: 0030c9358302b2bc7b184ae40501ac678cebbeff7d6bedb62c7e1caff5c1592069e6cda8a6501705f8c57464f4aa95a7ae04
2026-02-02T15:31:51.743220 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 50 bytes successfully. Data preview (hex): 0030c9358302b2bc7b184ae40501ac678cebbeff...
2026-02-02T15:31:51.743220 [FINE] [YamuxStream] [3][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:51.743220 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.743220 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.743220 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.743220 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.743220 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.743220 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.743220 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.743220 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.743220 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.743220 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.743220 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(357b57d6) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:51.744726 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(357b57d6) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 992ceced28dc1a3176efa3d0b7b7425686398d170b007bb77463e7a2
2026-02-02T15:31:51.744726 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.744726 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.744726 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(5a027b60) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.744726 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(5a027b60) END (from buffer). Returning 28 bytes: 992ceced28dc1a3176efa3d0b7b7425686398d170b007bb77463e7a2. Buffer after: 0 bytes: 
2026-02-02T15:31:51.744726 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [153, 44, 236, 237]
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 992ceced28dc1a3176efa3d0b7b7425686398d170b007bb77463e7a2
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 992ceced28dc1a3176efa3d0
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: b7b7425686398d170b007bb77463e7a2
2026-02-02T15:31:51.744726 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [153, 44, 236, 237]
2026-02-02T15:31:51.745842 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [183, 183, 66, 86]
2026-02-02T15:31:51.745842 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [183, 183, 66, 86, 134, 57, 141, 23, 11, 0, 123, 183, 116, 99, 231, 162]
2026-02-02T15:31:51.745842 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.746360 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059387928): [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:51.746360 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.746360 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.746360 [FINER] [YamuxStream] [2][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.746360 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.746360 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.746360 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.747876 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.747876 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.747876 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(940e29fc) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.747876 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(940e29fc) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.747876 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030c9358302b2bc7b184ae40501ac678cebbeff7d6bedb62c7e1caff5c1592069e6cda8a6501705f8c57464f4aa95a7ae04
2026-02-02T15:31:51.747876 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.748964 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.748964 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.748964 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.748964 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.748964 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.748964 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.748964 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.748964 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.748964 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(668d1911) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:51.748964 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(668d1911) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: c9358302b2bc7b184ae40501ac678cebbeff7d6bedb62c7e1caff5c1592069e6cda8a6501705f8c57464f4aa95a7ae04
2026-02-02T15:31:51.748964 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:51.748964 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.748964 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:51.748964 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:51.748964 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:51.749964 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:51.749964 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(da20522b) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:51.749964 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(da20522b) END (from buffer). Returning 48 bytes: c9358302b2bc7b184ae40501ac678cebbeff7d6bedb62c7e1caff5c1592069e6cda8a6501705f8c57464f4aa95a7ae04. Buffer after: 0 bytes: 
2026-02-02T15:31:51.749964 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [201, 53, 131, 2]
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: c9358302b2bc7b184ae40501ac678cebbeff7d6bedb62c7e1caff5c1592069e6cda8a6501705f8c57464f4aa95a7ae04
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c9358302b2bc7b184ae40501ac678cebbeff7d6bedb62c7e1caff5c1592069e6
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: cda8a6501705f8c57464f4aa95a7ae04
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [201, 53, 131, 2]
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [205, 168, 166, 80]
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [205, 168, 166, 80, 23, 5, 248, 197, 116, 100, 244, 170, 149, 167, 174, 4]
2026-02-02T15:31:51.749964 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.749964 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059387928): [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.750964 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:51.750964 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:51.750964 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:51.750964 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.750964 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.751468 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:51.751468 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.751468 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.751468 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.751468 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:51.751468 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:51.751468 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.751468 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:51.751468 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.752166 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:51.752166 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:51.752166 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:51.752166 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.752166 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:51.752166 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:51.752166 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:51.752166 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:51.752166 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:51.752166 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:51.752166 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 50 bytes: 0030dd0b36e75e2064b33897b060c389a5baea0bcdbb74b68fe0de36066ed2bf550586211c6061500f85607a2f4c08d6f940
2026-02-02T15:31:51.753240 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.753240 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.753240 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.753240 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.754243 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.754243 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.754243 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(81695417) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.754243 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(81695417) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.754243 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030dd0b36e75e2064b33897b060c389a5baea0bcdbb74b68fe0de36066ed2bf550586211c6061500f85607a2f4c08d6f940
2026-02-02T15:31:51.754243 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(940e29fc) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.754243 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(940e29fc) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: dd0b36e75e2064b33897b060c389a5baea0bcdbb74b68fe0de36066ed2bf550586211c6061500f85607a2f4c08d6f940
2026-02-02T15:31:51.754243 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:51.754243 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:51.754243 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:51.754243 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(6cdd8265) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:51.754243 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(6cdd8265) END (from buffer). Returning 48 bytes: dd0b36e75e2064b33897b060c389a5baea0bcdbb74b68fe0de36066ed2bf550586211c6061500f85607a2f4c08d6f940. Buffer after: 0 bytes: 
2026-02-02T15:31:51.755344 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [221, 11, 54, 231]
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: dd0b36e75e2064b33897b060c389a5baea0bcdbb74b68fe0de36066ed2bf550586211c6061500f85607a2f4c08d6f940
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: dd0b36e75e2064b33897b060c389a5baea0bcdbb74b68fe0de36066ed2bf5505
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 86211c6061500f85607a2f4c08d6f940
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [221, 11, 54, 231]
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [134, 33, 28, 96]
2026-02-02T15:31:51.755344 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [134, 33, 28, 96, 97, 80, 15, 133, 96, 122, 47, 76, 8, 214, 249, 64]
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.755861 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:51.755861 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:51.755861 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.755861 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.756864 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:51.756864 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:51.756864 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.756864 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:51.756864 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.756864 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:51.756864 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:51.756864 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:51.756864 [FINE] [YamuxStream] [3][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:51.756864 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:51.756864 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:51.758162 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:51.758162 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:51.758162 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 46 bytes: 002c1f7a25a3a71f9d960629bb3f6082e250972cadc10f812ae632597d8483535bb1374b8c1a007eae53aca61e41
2026-02-02T15:31:51.758162 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 50 bytes successfully. Data preview (hex): 0030dd0b36e75e2064b33897b060c389a5baea0b...
2026-02-02T15:31:51.758162 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 5ms
2026-02-02T15:31:51.758162 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:51.758162 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:51.758162 [FINEST] [YamuxStream] [2][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.758162 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.758162 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.758162 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.759611 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.759611 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.759611 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.759611 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.759611 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.759611 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.759611 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(67b7cbf9) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.759611 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(67b7cbf9) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.759611 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c1f7a25a3a71f9d960629bb3f6082e250972cadc10f812ae632597d8483535bb1374b8c1a007eae53aca61e41
2026-02-02T15:31:51.760644 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(81695417) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.760644 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(81695417) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 1f7a25a3a71f9d960629bb3f6082e250972cadc10f812ae632597d8483535bb1374b8c1a007eae53aca61e41
2026-02-02T15:31:51.760644 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:51.760644 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.760644 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:51.760644 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:51.760644 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:51.760644 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:51.760644 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:51.760644 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(23f147af) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:51.760644 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(23f147af) END (from buffer). Returning 44 bytes: 1f7a25a3a71f9d960629bb3f6082e250972cadc10f812ae632597d8483535bb1374b8c1a007eae53aca61e41. Buffer after: 0 bytes: 
2026-02-02T15:31:51.760644 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [31, 122, 37, 163]
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 1f7a25a3a71f9d960629bb3f6082e250972cadc10f812ae632597d8483535bb1374b8c1a007eae53aca61e41
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1f7a25a3a71f9d960629bb3f6082e250972cadc10f812ae632597d84
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 83535bb1374b8c1a007eae53aca61e41
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [31, 122, 37, 163]
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [131, 83, 91, 177]
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [131, 83, 91, 177, 55, 75, 140, 26, 0, 126, 174, 83, 172, 166, 30, 65]
2026-02-02T15:31:51.761643 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.761643 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059387928): [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.761643 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:51.763148 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:51.763148 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:51.763148 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:51.763148 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:51.763148 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.763148 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:51.763148 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:51.763148 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:51.763148 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:51.763148 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:51.763148 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:51.763148 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:51.764796 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:51.764796 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:51.764796 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:51.764796 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:51.764796 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 46 bytes: 002c678185fb143cb33d3b491e7c8711c75a2b588da669d3da6a5fc25d1d6ff6f0f91c88cbaf0df961bb4470df40
2026-02-02T15:31:51.764796 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 46 bytes successfully. Data preview (hex): 002c1f7a25a3a71f9d960629bb3f6082e250972c...
2026-02-02T15:31:51.764796 [FINE] [YamuxStream] [3][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 7ms
2026-02-02T15:31:51.764796 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.764796 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.764796 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.764796 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.764796 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.765876 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.765876 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.765876 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(94ce2144) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.765876 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(94ce2144) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.765876 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c678185fb143cb33d3b491e7c8711c75a2b588da669d3da6a5fc25d1d6ff6f0f91c88cbaf0df961bb4470df40
2026-02-02T15:31:51.765876 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(67b7cbf9) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.765876 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(67b7cbf9) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 678185fb143cb33d3b491e7c8711c75a2b588da669d3da6a5fc25d1d6ff6f0f91c88cbaf0df961bb4470df40
2026-02-02T15:31:51.765876 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:51.765876 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:51.765876 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:51.765876 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(f494ce4e) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:51.765876 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(f494ce4e) END (from buffer). Returning 44 bytes: 678185fb143cb33d3b491e7c8711c75a2b588da669d3da6a5fc25d1d6ff6f0f91c88cbaf0df961bb4470df40. Buffer after: 0 bytes: 
2026-02-02T15:31:51.766885 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [103, 129, 133, 251]
2026-02-02T15:31:51.766885 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:51.766885 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 678185fb143cb33d3b491e7c8711c75a2b588da669d3da6a5fc25d1d6ff6f0f91c88cbaf0df961bb4470df40
2026-02-02T15:31:51.766885 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:51.766885 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:51.766885 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 678185fb143cb33d3b491e7c8711c75a2b588da669d3da6a5fc25d1d
2026-02-02T15:31:51.766885 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 6ff6f0f91c88cbaf0df961bb4470df40
2026-02-02T15:31:51.767430 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [103, 129, 133, 251]
2026-02-02T15:31:51.767430 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [111, 246, 240, 249]
2026-02-02T15:31:51.767430 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [111, 246, 240, 249, 28, 136, 203, 175, 13, 249, 97, 187, 68, 112, 223, 64]
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.767430 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:51.767430 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:51.767430 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.767430 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:51.768462 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:51.768462 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:51.768462 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:51.768462 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.768462 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:51.768462 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:51.768462 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:51.768462 [FINE] [YamuxStream] [3][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:21.768462
2026-02-02T15:31:51.768462 [FINE] [StreamScopeImpl] stream-1770067911741-7693: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.768462 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:51.769525 [FINE] [StreamScopeImpl] stream-1770067911741-7693: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:51.770527 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:51.770527 [FINE] [StreamScopeImpl] stream-1770067911741-7693: Setting service to libp2p.identify for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, protocol /ipfs/id/1.0.0
2026-02-02T15:31:51.770527 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:51.770527 [FINE] [StreamScopeImpl] stream-1770067911741-7693: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:51.770527 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:51.770527 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 46 bytes successfully. Data preview (hex): 002c678185fb143cb33d3b491e7c8711c75a2b58...
2026-02-02T15:31:51.771525 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 8ms
2026-02-02T15:31:51.771525 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:51.771525 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:51.771525 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:51.771525 [FINE] [StreamScopeImpl] stream-1770067911735-7672: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.771525 [FINE] [StreamScopeImpl] stream-1770067911735-7672: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:51.771525 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:51.771525 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc (reported as 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc) on stream 1
2026-02-02T15:31:51.772527 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false. Stream ID: 1
2026-02-02T15:31:51.772527 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false. Stream ID: 1
2026-02-02T15:31:51.772527 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.772527 [FINE] [StreamScopeImpl] stream-1770067911735-7672: Setting service to libp2p.identify for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, protocol /ipfs/id/1.0.0
2026-02-02T15:31:51.772527 [FINE] [StreamScopeImpl] stream-1770067911735-7672: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:51.772527 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.772527 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc: seq=3, protocols=6, addrs=2
2026-02-02T15:31:51.772527 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Snapshot seq: 3
2026-02-02T15:31:51.772527 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58547 for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.772527 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4102, RemoteAddr: /ip4/127.0.0.1/tcp/58547, ViaLoopback: true for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.773804 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58547)
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Total message size: 414 bytes. SignedPeerRecord present: true
2026-02-02T15:31:51.773804 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 414).
2026-02-02T15:31:51.773804 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 416 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:51.773804 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 428, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160, 158, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:31:51.773804 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:51.773804 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 444 bytes (plaintext was 428)
2026-02-02T15:31:51.775310 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 446
2026-02-02T15:31:51.775310 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 446 bytes: 01bc6cebea3bff7bc7f5db8a1f6b684fe9e3a045a7755bfcd2c14f02c4e23b2f4ef753b1c80c059f21ca3984ad4d13c7005c068f5ccd30d0edcb37dff28da067a5d583612e4a0cb95a8b7f12c7dcccdff5be6f91d10ddfce24f44920cb01d16d7bac77b2d6fe81f0743b31c33c6789ffecc7b608180f7b82533ab4872a691adbe4c2faa752e9a67d36fd12c53174b26ea6e04a6c6acfa02e9fb1b2d4f216d59e5867d650ef0893de4565d7af2f61a9d346b4f7f378283d1acc204ed5938062c36a9ad111d3a490345acc921c22e83e9076c5f87b6219c4e58614bd32322cade3190a191ddbc6c7ff8df657e96aee4d4174bd3912350ce64bc916a1288d00bc54586ceea3493b6cf5d09375651808669699a174f08e82ada4685bd7f1056b8d1fe2a891f66d3b56f0c5440975672eee34b2b2bd62e76130ab9ee0c006804a4e3b02a502d319c2bbadc44e178f5f49804b171962619a05e17353d5d32ffbe2087a8e594e6863b4f2288071eb0ec63d640311af10ade9e6e97a7c21248b9ff6d378b16479c3708a9657aebbe1fd676715bb488101873db81071b10be9209ebf2a4f28eeba75844cb6033a9de5dc008a2b008fb85f530bf22f7d4d56234ad69a
2026-02-02T15:31:51.775310 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.775310 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.775310 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.775310 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.775310 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.775310 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.775310 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.775310 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.775310 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.775310 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(34f20758) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.776479 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(34f20758) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.776479 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (446 bytes): 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
2026-02-02T15:31:51.776479 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(34f20758) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.776479 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(34f20758) END (from buffer). Returning 2 bytes: 01bc. Buffer after: 444 bytes: 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
2026-02-02T15:31:51.776479 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 188]
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 188]
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01bc
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 444
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 444
2026-02-02T15:31:51.776479 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 444 more bytes (have 0/444)
2026-02-02T15:31:51.776479 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(446ca4a7) START. Requested: 444. Buffer: 444 bytes.
2026-02-02T15:31:51.776479 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(446ca4a7) END (from buffer). Returning 444 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:31:51.776479 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 444 bytes. First 4 bytes: [108, 235, 234, 59]
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 444, Got: 444
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 444, Bytes: 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
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 444
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(428) and MAC(16)
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2b008fb85f530bf22f7d4d56234ad69a
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [108, 235, 234, 59]
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [43, 0, 143, 184]
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [43, 0, 143, 184, 95, 83, 11, 242, 47, 125, 77, 86, 35, 74, 214, 154]
2026-02-02T15:31:51.776479 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.776479 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.778264 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 428 bytes
2026-02-02T15:31:51.778264 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 428 bytes to _decryptedBuffer. New _decryptedBuffer.length: 428
2026-02-02T15:31:51.778264 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 416. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160]
2026-02-02T15:31:51.778264 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.778781 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.778781 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=416
2026-02-02T15:31:51.778781 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.778781 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.778781 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.778781 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=416
2026-02-02T15:31:51.779294 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 416, _decryptedBuffer.length: 416
2026-02-02T15:31:51.779294 [FINER] [SecuredConnection] SecuredConnection.read (length=416): Returning 416 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [158, 3, 10, 36, 8, 1, 18, 32, 10, 164, 141, 210, 6, 184, 66, 185, 2, 158, 10, 114]
2026-02-02T15:31:51.779294 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=416
2026-02-02T15:31:51.779294 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.779294 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 416, flags: 0
2026-02-02T15:31:51.779836 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 416 bytes directly to waiting reader
2026-02-02T15:31:51.779836 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 452
2026-02-02T15:31:51.779836 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, 414 bytes, duration=9ms
2026-02-02T15:31:51.779836 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. IsPush: false.
2026-02-02T15:31:51.779836 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 0
2026-02-02T15:31:51.779836 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 6
2026-02-02T15:31:51.779836 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 6
2026-02-02T15:31:51.779836 [FINER] [identify] IdentifyService._diff: Added: 6, Removed: 0
2026-02-02T15:31:51.779836 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Added protocols: 6, Removed protocols: 0
2026-02-02T15:31:51.779836 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: /ip4/127.0.0.1/tcp/58547
2026-02-02T15:31:51.781343 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58547 for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN via conn 0.
2026-02-02T15:31:51.781343 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.781343 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.781913 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (181 bytes).
2026-02-02T15:31:51.781913 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:51.781913 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:51.789328 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:51.790333 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: true
2026-02-02T15:31:51.790333 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:51.790839 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:51.790839 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:51.790839 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.790839 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.790839 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from record public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.790839 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.791854 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Found 2 addresses.
2026-02-02T15:31:51.791854 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:51.791854 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN based on remote connection address /ip4/127.0.0.1/tcp/4102. Before filter: 2
2026-02-02T15:31:51.792378 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4102 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:51.792378 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:51.793382 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:51.793382 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:51.793887 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.794391 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:51.794391 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.794391 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from local peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.794391 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.794943 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.794943 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.794943 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches expected remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.794943 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Comparing with received key.
2026-02-02T15:31:51.794943 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches existing key in peerstore.
2026-02-02T15:31:51.795947 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:51.795947 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN in peerstore.
2026-02-02T15:31:51.796453 [FINE] [autonatv2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN identification completed, updating peer map
2026-02-02T15:31:51.796453 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports push.
2026-02-02T15:31:51.796453 [FINER] [YamuxStream] [3][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:51.796453 [FINER] [YamuxStream] [3][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:51.796453 [FINE] [autonatv2] Updating peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:31:51.796453 [FINE] [autonatv2] Adding peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:51.797458 [FINE] [ambient_autonat_v2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports AutoNAT v2, scheduling probe
2026-02-02T15:31:51.797458 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:51.797458 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:51.797458 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:51.797458 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.797458 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.797458 [FINER] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Writing 30 bytes: 001c4535f9eda01722bcef3f5b5c781978e1942a9a2c84d8a1e73c5e257a
2026-02-02T15:31:51.797458 [FINEST] [TCPConnection] TCPConnection.write (id: 76153328-b498-4740-a7ac-1ad9acc8a9fd): Flushed 30 bytes successfully. Data preview (hex): 001c4535f9eda01722bcef3f5b5c781978e1942a...
2026-02-02T15:31:51.797458 [FINE] [YamuxStream] [3][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:51.797458 [FINE] [YamuxStream] [3][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:51.798620 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, duration=73ms
2026-02-02T15:31:51.798620 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:51.798620 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 446 bytes successfully. Data preview (hex): 01bc6cebea3bff7bc7f5db8a1f6b684fe9e3a045...
2026-02-02T15:31:51.799160 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 416 bytes in 25ms
2026-02-02T15:31:51.799160 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.799160 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.799160 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.799160 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc to 3.
2026-02-02T15:31:51.799160 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:51.799160 [FINER] [YamuxStream] [2][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:51.799160 [FINER] [YamuxStream] [2][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:51.800170 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:51.800170 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:51.800170 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.800170 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.800170 [FINER] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Writing 30 bytes: 001c45bcf9ecee3fad47026ab7fbcbc2a6bb4fb84ea81ba5976151c7b3ff
2026-02-02T15:31:51.800170 [FINEST] [TCPConnection] TCPConnection.write (id: 8263a74d-3690-4d1d-9316-a3542308d8b3): Flushed 30 bytes successfully. Data preview (hex): 001c45bcf9ecee3fad47026ab7fbcbc2a6bb4fb8...
2026-02-02T15:31:51.801172 [FINE] [YamuxStream] [2][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:51.801172 [FINE] [YamuxStream] [2][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:51.801172 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:51.801172 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false.
2026-02-02T15:31:51.801172 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.801680 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.801680 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.801680 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.801680 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.801680 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.801680 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.801680 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.801680 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.801680 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(a95e95e8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.801680 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(a95e95e8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.801680 [FINEST] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c4535f9eda01722bcef3f5b5c781978e1942a9a2c84d8a1e73c5e257a
2026-02-02T15:31:51.802696 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(94ce2144) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.802696 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(94ce2144) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 4535f9eda01722bcef3f5b5c781978e1942a9a2c84d8a1e73c5e257a
2026-02-02T15:31:51.802696 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.802696 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.802696 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.802696 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.802696 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.802696 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.802696 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.803696 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(0bd35fe9) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.803696 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(0bd35fe9) END (from buffer). Returning 28 bytes: 4535f9eda01722bcef3f5b5c781978e1942a9a2c84d8a1e73c5e257a. Buffer after: 0 bytes: 
2026-02-02T15:31:51.803696 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [69, 53, 249, 237]
2026-02-02T15:31:51.803696 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.803696 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 4535f9eda01722bcef3f5b5c781978e1942a9a2c84d8a1e73c5e257a
2026-02-02T15:31:51.803696 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.803696 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.803696 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4535f9eda01722bcef3f5b5c
2026-02-02T15:31:51.804696 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 781978e1942a9a2c84d8a1e73c5e257a
2026-02-02T15:31:51.804696 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [69, 53, 249, 237]
2026-02-02T15:31:51.804696 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [120, 25, 120, 225]
2026-02-02T15:31:51.806201 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [120, 25, 120, 225, 148, 42, 154, 44, 132, 216, 161, 231, 60, 94, 37, 122]
2026-02-02T15:31:51.806201 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.806201 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059387928): [197, 53, 33, 232, 214, 59, 126, 57, 223, 32, 89, 121, 149, 112, 55, 124, 117, 45, 179, 250, 6, 150, 138, 241, 220, 118, 246, 248, 178, 74, 105, 104]
2026-02-02T15:31:51.806201 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:51.806201 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.807217 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:51.807217 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.807217 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.807217 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:51.807217 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:51.807217 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:51.807217 [FINEST] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c45bcf9ecee3fad47026ab7fbcbc2a6bb4fb84ea81ba5976151c7b3ff
2026-02-02T15:31:51.807217 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(a95e95e8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.808722 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(a95e95e8) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 45bcf9ecee3fad47026ab7fbcbc2a6bb4fb84ea81ba5976151c7b3ff
2026-02-02T15:31:51.808722 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.808722 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.808722 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.808722 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.809725 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.809725 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.809725 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.809725 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(70e88d47) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.809725 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(70e88d47) END (from buffer). Returning 28 bytes: 45bcf9ecee3fad47026ab7fbcbc2a6bb4fb84ea81ba5976151c7b3ff. Buffer after: 0 bytes: 
2026-02-02T15:31:51.809725 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [69, 188, 249, 236]
2026-02-02T15:31:51.809725 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.809725 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 45bcf9ecee3fad47026ab7fbcbc2a6bb4fb84ea81ba5976151c7b3ff
2026-02-02T15:31:51.809725 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.809725 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.809725 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 45bcf9ecee3fad47026ab7fb
2026-02-02T15:31:51.810725 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: cbc2a6bb4fb84ea81ba5976151c7b3ff
2026-02-02T15:31:51.810725 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [69, 188, 249, 236]
2026-02-02T15:31:51.810725 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [203, 194, 166, 187]
2026-02-02T15:31:51.810725 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [203, 194, 166, 187, 79, 184, 78, 168, 27, 165, 151, 97, 81, 199, 179, 255]
2026-02-02T15:31:51.810725 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.810725 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061996872): [57, 40, 238, 150, 246, 41, 57, 172, 215, 130, 177, 11, 242, 134, 130, 151, 115, 199, 113, 249, 91, 149, 137, 210, 100, 53, 187, 243, 200, 40, 92, 53]
2026-02-02T15:31:51.810725 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:51.810725 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.811725 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:51.811725 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.811725 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.811725 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:51.811725 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:51.811725 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:51.811725 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.811725 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.811725 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.811725 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.812725 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.812725 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.812725 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.812725 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.812725 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.812725 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(38753a38) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.812725 [FINER] [TCPConnection] TCPConnection(8263a74d-3690-4d1d-9316-a3542308d8b3) - Read(38753a38) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.813724 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.813724 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.813724 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.813724 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.813724 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.813724 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.813724 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.813724 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.814395 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.814395 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(a39eb35c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.814395 [FINER] [TCPConnection] TCPConnection(76153328-b498-4740-a7ac-1ad9acc8a9fd) - Read(a39eb35c) ASYNC WAIT. Requested: 2. Buffer: 0
00:59 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:51.906896 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:31:51.907402 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58538 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:31:51.907402 [FINE] [ambient_autonat_v2] Probe generation 3 cancelled (current: 4)
2026-02-02T15:31:51.907936 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:31:51.907936 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58538: ServerSocket closed.
2026-02-02T15:31:51.907936 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/58538 connectionStream is done. Removing listener.
2026-02-02T15:31:51.907936 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58538 already closed.
2026-02-02T15:31:51.907936 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58538: ConnectionController closed.
2026-02-02T15:31:51.907936 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWBuACwt7CWAgdgCa7N2g4g7PBByVyBeV27peh3UnL7Pwa
2026-02-02T15:31:51.907936 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501: ServerSocket closed.
2026-02-02T15:31:51.907936 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4501 connectionStream is done. Removing listener.
2026-02-02T15:31:51.907936 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501 already closed.
2026-02-02T15:31:51.907936 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501: ConnectionController closed.
2026-02-02T15:31:51.908974 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:31:51.908974 [FINE] [YamuxStream] [0][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:51.908974 [FINER] [YamuxStream] [0][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:51.908974 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k
2026-02-02T15:31:51.908974 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:51.908974 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=14
2026-02-02T15:31:51.909982 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.909982 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.909982 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001ce90691a693ce886d0d4b2d7f1d118a20fa0e02b1e28f2e4ef7dc9929
2026-02-02T15:31:51.909982 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ce90691a693ce886d0d4b2d7f1d118a20fa0e02b1e28f2e4ef7dc9929
2026-02-02T15:31:51.909982 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(a809942f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.909982 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(a809942f) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: e90691a693ce886d0d4b2d7f1d118a20fa0e02b1e28f2e4ef7dc9929
2026-02-02T15:31:51.909982 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.909982 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.909982 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.909982 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.909982 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.909982 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.909982 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.909982 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(76e2f086) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.909982 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(76e2f086) END (from buffer). Returning 28 bytes: e90691a693ce886d0d4b2d7f1d118a20fa0e02b1e28f2e4ef7dc9929. Buffer after: 0 bytes: 
2026-02-02T15:31:51.909982 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [233, 6, 145, 166]
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e90691a693ce886d0d4b2d7f1d118a20fa0e02b1e28f2e4ef7dc9929
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e90691a693ce886d0d4b2d7f
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1d118a20fa0e02b1e28f2e4ef7dc9929
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [233, 6, 145, 166]
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [29, 17, 138, 32]
2026-02-02T15:31:51.910981 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [29, 17, 138, 32, 250, 14, 2, 177, 226, 143, 46, 78, 247, 220, 153, 41]
2026-02-02T15:31:51.910981 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=14 ([0, 0, 0, 0, 14, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.911485 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.911485 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=14, got 12 bytes
2026-02-02T15:31:51.911485 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.911485 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:51.911485 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.911485 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.911485 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:51.911485 [FINE] [YamuxStream] [1][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:51.911485 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001ce90691a693ce886d0d4b2d7f1d118a20fa0e...
2026-02-02T15:31:51.911485 [FINER] [YamuxStream] [0][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
2026-02-02T15:31:51.911485 [FINER] [YamuxStream] [0][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:51.911485 [FINER] [YamuxStream] [0][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:51.911485 [FINER] [YamuxStream] [0][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:51.911485 [FINE] [YamuxStream] [0][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.911485 [FINE] [YamuxStream] [0][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.911485 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:31:51.912756 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:31:51.913265 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.913265 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=15
2026-02-02T15:31:51.913265 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.913265 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.913265 [FINER] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Writing 30 bytes: 001cc75c3ffeb8b4d30f2cf0b20c822731de2d182a813b3b1b5bb9d47e75
2026-02-02T15:31:51.914271 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:51.914271 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:51.914271 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:51.914271 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:51.914271 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:51.914271 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:51.914271 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:51.914271 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:51.914271 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:51.914271 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(c68844a6) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:51.914271 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(c68844a6) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:51.914271 [FINEST] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc75c3ffeb8b4d30f2cf0b20c822731de2d182a813b3b1b5bb9d47e75
2026-02-02T15:31:51.914271 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(c68844a6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:51.914271 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(c68844a6) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c75c3ffeb8b4d30f2cf0b20c822731de2d182a813b3b1b5bb9d47e75
2026-02-02T15:31:51.915356 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:51.915356 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:51.915356 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(4d431457) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:51.915356 [FINER] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Read(4d431457) END (from buffer). Returning 28 bytes: c75c3ffeb8b4d30f2cf0b20c822731de2d182a813b3b1b5bb9d47e75. Buffer after: 0 bytes: 
2026-02-02T15:31:51.915356 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [199, 92, 63, 254]
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c75c3ffeb8b4d30f2cf0b20c822731de2d182a813b3b1b5bb9d47e75
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c75c3ffeb8b4d30f2cf0b20c
2026-02-02T15:31:51.915356 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 822731de2d182a813b3b1b5bb9d47e75
2026-02-02T15:31:51.916378 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [199, 92, 63, 254]
2026-02-02T15:31:51.916378 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [130, 39, 49, 222]
2026-02-02T15:31:51.916378 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [130, 39, 49, 222, 45, 24, 42, 129, 59, 59, 27, 91, 185, 212, 126, 117]
2026-02-02T15:31:51.916378 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=15 ([0, 0, 0, 0, 15, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.916378 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063596826): [38, 241, 56, 49, 117, 26, 16, 64, 208, 150, 151, 224, 137, 101, 154, 249, 63, 36, 186, 23, 136, 235, 235, 240, 64, 160, 21, 160, 27, 119, 223, 114]
2026-02-02T15:31:51.916378 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=15, got 12 bytes
2026-02-02T15:31:51.916378 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:51.916378 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:31:51.916378 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.917384 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.917384 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.917384 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:31:51.917384 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.917384 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.917384 [FINER] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Writing 30 bytes: 001cd78b58865567e0fb00132ce2014255396c0f92ec8a4cf9198a98dec3
2026-02-02T15:31:51.918391 [FINEST] [TCPConnection] TCPConnection.write (id: c2a11599-c9b4-4822-ab1e-920a026d1997): Flushed 30 bytes successfully. Data preview (hex): 001cd78b58865567e0fb00132ce2014255396c0f...
2026-02-02T15:31:51.918391 [FINE] [YamuxStream] [1][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:51.919391 [FINER] [YamuxStream] [1][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:51.919391 [FINER] [YamuxStream] [1][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:51.919391 [FINER] [YamuxStream] [1][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:51.919391 [FINE] [YamuxStream] [1][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:51.919391 [FINE] [YamuxStream] [1][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:31:51.919391 [FINE] [YamuxStream] [1][Server] StreamID=3 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:51.925398 [FINER] [YamuxStream] [1][Server] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:51.925398 [FINER] [YamuxStream] [1][Server] StreamID=3 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:51.934408 [FINER] [YamuxStream] [1][Server] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:51.934408 [FINE] [YamuxStream] [1][Server] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:51.934408 [FINE] [YamuxStream] [1][Server] StreamID=3 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:31:51.937924 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:31:51.965890 [FINE] [TCPConnection] TCPConnection(c2a11599-c9b4-4822-ab1e-920a026d1997) - Connection closed.
2026-02-02T15:31:51.965890 [FINEST] [TCPConnection] TCPConnection.write (id: d23a5679-c88e-447b-b403-a7e1d522fe3d): Flushed 30 bytes successfully. Data preview (hex): 001cc75c3ffeb8b4d30f2cf0b20c822731de2d18...
2026-02-02T15:31:51.966925 [FINE] [YamuxStream] [0][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:31:51.966925 [FINER] [YamuxStream] [0][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:31:51.966925 [FINE] [YamuxStream] [0][Client] StreamID=3 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:31:51.967927 [FINER] [YamuxStream] [0][Client] StreamID=3 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:31:51.967927 [FINE] [Swarm] AcceptStream loop for conn 0 to 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5 terminated due to connection closure.
2026-02-02T15:31:51.968925 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:31:51.968925 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:51.968925 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:51.968925 [FINE] [TCPConnection] TCPConnection(d23a5679-c88e-447b-b403-a7e1d522fe3d) - Connection closed.
2026-02-02T15:31:51.969930 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:31:51.969930 [FINE] [YamuxStream] [3][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:51.969930 [FINER] [YamuxStream] [3][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:51.969930 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:51.970926 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=14
2026-02-02T15:31:51.972432 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.972432 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.972432 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001c725ce6db112379b6844bd331080f1d1ef9f926ed564d922c23155a87
2026-02-02T15:31:51.973449 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001c725ce6db112379b6844bd331080f1d1ef9f9...
2026-02-02T15:31:51.973449 [FINER] [YamuxStream] [3][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
2026-02-02T15:31:51.973449 [FINER] [YamuxStream] [3][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:51.973449 [FINER] [YamuxStream] [3][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:51.973449 [FINER] [YamuxStream] [3][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:51.973449 [FINE] [YamuxStream] [3][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.974448 [FINE] [YamuxStream] [3][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:51.974448 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:31:51.974448 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:31:51.974953 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:51.974953 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=15
2026-02-02T15:31:51.974953 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:51.975459 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:51.975459 [FINER] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Writing 30 bytes: 001c7f2636f14bf1ec6e6f1e16808bf63bd928a0190b556c31bd86dce9fe
2026-02-02T15:31:52.027472 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c725ce6db112379b6844bd331080f1d1ef9f926ed564d922c23155a87
2026-02-02T15:31:52.027472 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(556faf43) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.028637 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(556faf43) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 725ce6db112379b6844bd331080f1d1ef9f926ed564d922c23155a87
2026-02-02T15:31:52.028637 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.028637 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.029154 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.029154 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.029154 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.029154 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.029154 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.029154 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(0ef3b0b5) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.029154 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(0ef3b0b5) END (from buffer). Returning 28 bytes: 725ce6db112379b6844bd331080f1d1ef9f926ed564d922c23155a87. Buffer after: 0 bytes: 
2026-02-02T15:31:52.030036 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [114, 92, 230, 219]
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 725ce6db112379b6844bd331080f1d1ef9f926ed564d922c23155a87
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 725ce6db112379b6844bd331
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 080f1d1ef9f926ed564d922c23155a87
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [114, 92, 230, 219]
2026-02-02T15:31:52.030036 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [8, 15, 29, 30]
2026-02-02T15:31:52.031039 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [8, 15, 29, 30, 249, 249, 38, 237, 86, 77, 146, 44, 35, 21, 90, 135]
2026-02-02T15:31:52.031039 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=14 ([0, 0, 0, 0, 14, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.032038 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:52.032038 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=14, got 12 bytes
2026-02-02T15:31:52.032038 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.032038 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.033039 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.033039 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.033039 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:52.033039 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:52.033039 [FINEST] [TCPConnection] TCPConnection.write (id: ebb145fd-a57a-450c-8bfb-454ed80b4d17): Flushed 30 bytes successfully. Data preview (hex): 001c7f2636f14bf1ec6e6f1e16808bf63bd928a0...
2026-02-02T15:31:52.033709 [FINE] [YamuxStream] [3][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:31:52.033709 [FINER] [YamuxStream] [3][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:31:52.033709 [FINE] [YamuxStream] [3][Client] StreamID=3 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:31:52.033709 [FINER] [YamuxStream] [3][Client] StreamID=3 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:31:52.034214 [FINE] [Swarm] AcceptStream loop for conn 1 to 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE terminated due to connection closure.
2026-02-02T15:31:52.034214 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:31:52.034214 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.034214 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.034214 [FINE] [TCPConnection] TCPConnection(ebb145fd-a57a-450c-8bfb-454ed80b4d17) - Connection closed.
2026-02-02T15:31:52.048879 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:52.050303 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:52.050303 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:52.050303 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:52.050303 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:52.050303 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:52.050807 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:52.050807 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:52.050807 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:52.050807 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:52.050807 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:52.051319 [INFO] [Config] [Config.newNode] for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj: Host created. Listening will be handled by host.start().
2026-02-02T15:31:52.051319 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:52.051319 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, network.hashCode: 365133498, initial network.listenAddresses: []
2026-02-02T15:31:52.051319 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:52.051319 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4601]. Attempting to listen via _network.listen().
2026-02-02T15:31:52.051319 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:52.051319 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4601] for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:52.052401 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:52.052401 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4601 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:52.052401 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4601 with transport TCPTransport for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:52.052401 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4601 with transport TCPTransport
2026-02-02T15:31:52.053906 [FINEST] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c7f2636f14bf1ec6e6f1e16808bf63bd928a0190b556c31bd86dce9fe
2026-02-02T15:31:52.054924 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.054924 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.054924 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.054924 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.054924 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.055924 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.055924 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.057433 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.057433 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.057433 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(21fdcadf) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:52.057433 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(21fdcadf) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 7f2636f14bf1ec6e6f1e16808bf63bd928a0190b556c31bd86dce9fe
2026-02-02T15:31:52.057433 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.057433 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.057433 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.057433 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.057433 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.057433 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.057433 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.058433 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(a6f04471) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.058433 [FINER] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Read(a6f04471) END (from buffer). Returning 28 bytes: 7f2636f14bf1ec6e6f1e16808bf63bd928a0190b556c31bd86dce9fe. Buffer after: 0 bytes: 
2026-02-02T15:31:52.058433 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [127, 38, 54, 241]
2026-02-02T15:31:52.058433 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.058937 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 7f2636f14bf1ec6e6f1e16808bf63bd928a0190b556c31bd86dce9fe
2026-02-02T15:31:52.058937 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.058937 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.058937 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7f2636f14bf1ec6e6f1e1680
2026-02-02T15:31:52.058937 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8bf63bd928a0190b556c31bd86dce9fe
2026-02-02T15:31:52.058937 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [127, 38, 54, 241]
2026-02-02T15:31:52.058937 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [139, 246, 59, 217]
2026-02-02T15:31:52.059941 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [139, 246, 59, 217, 40, 160, 25, 11, 85, 108, 49, 189, 134, 220, 233, 254]
2026-02-02T15:31:52.059941 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=15 ([0, 0, 0, 0, 15, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.059941 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057100261): [172, 47, 63, 236, 61, 60, 110, 9, 21, 188, 31, 7, 51, 204, 15, 104, 145, 248, 89, 63, 198, 160, 234, 4, 77, 177, 152, 19, 205, 61, 253, 71]
2026-02-02T15:31:52.059941 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=15, got 12 bytes
2026-02-02T15:31:52.059941 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.060940 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:31:52.060940 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.060940 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.060940 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.060940 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:31:52.060940 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.060940 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.060940 [FINER] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Writing 30 bytes: 001c73cf9bafcfb300331bee7dbbb4f3861c4db424b492bc377f0692d1c5
2026-02-02T15:31:52.061941 [FINEST] [TCPConnection] TCPConnection.write (id: 751ce30b-8303-4a1c-83a9-bdf2ee41951d): Flushed 30 bytes successfully. Data preview (hex): 001c73cf9bafcfb300331bee7dbbb4f3861c4db4...
2026-02-02T15:31:52.061941 [FINE] [YamuxStream] [2][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:52.061941 [FINER] [YamuxStream] [2][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:52.061941 [FINER] [YamuxStream] [2][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:52.061941 [FINER] [YamuxStream] [2][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:52.061941 [FINE] [YamuxStream] [2][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:52.062941 [FINE] [YamuxStream] [2][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:31:52.062941 [FINE] [YamuxStream] [2][Server] StreamID=3 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:52.062941 [FINER] [YamuxStream] [2][Server] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:52.062941 [FINER] [YamuxStream] [2][Server] StreamID=3 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:52.062941 [FINER] [YamuxStream] [2][Server] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:52.062941 [FINE] [YamuxStream] [2][Server] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:52.063502 [FINE] [YamuxStream] [2][Server] StreamID=3 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:31:52.063502 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWHgEg38H22bJ44xCzUjbzbvXcK61J2VgFrY6e1cNGaq9k: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:31:52.063910 [FINE] [TCPConnection] TCPConnection(751ce30b-8303-4a1c-83a9-bdf2ee41951d) - Connection closed.
00:59 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:52.314050 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/1.0.0
2026-02-02T15:31:52.314581 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz via protocol /test/1.0.0
2026-02-02T15:31:52.315666 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, protocols: [/test/1.0.0]
2026-02-02T15:31:52.316748 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz...
2026-02-02T15:31:52.316748 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:52.316748 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, Host hashCode: 682905032
2026-02-02T15:31:52.316748 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:52.316748 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:52.316748 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:52.316748 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:52.316748 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, existing_conns=1
2026-02-02T15:31:52.316748 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz"
2026-02-02T15:31:52.316748 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz"
2026-02-02T15:31:52.316748 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Dialing.
2026-02-02T15:31:52.316748 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=0, protocols=7
2026-02-02T15:31:52.316748 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:52.318002 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:52.318002 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:52.318002 [FINE] [Swarm] Dialing 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:52.318002 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4102 (priority 1)
2026-02-02T15:31:52.318002 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:52.321069 [FINE] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4102, Socket Remote: 127.0.0.1:58548
2026-02-02T15:31:52.322072 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912322-3335
2026-02-02T15:31:52.322072 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:52.322072 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(add98b69) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.322072 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(add98b69) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.328399 [FINE] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58548, Socket Remote: 127.0.0.1:4102
2026-02-02T15:31:52.329401 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912329-539
2026-02-02T15:31:52.329905 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWPuccaAqskS3Koy8W2YzF7BCufttkiHg4xytn2sbb57Rj
2026-02-02T15:31:52.329905 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.330538 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.330538 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(add98b69) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.330538 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(add98b69) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:52.330538 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.330538 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.330538 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.331069 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:52.331069 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(eec12c30) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.331069 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(eec12c30) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.331069 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.331069 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(eec12c30) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.331069 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(eec12c30) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:52.331069 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:52.331069 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:52.332092 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:52.332092 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.332092 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e41d7abd) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.332092 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e41d7abd) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.332092 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:52.332092 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e41d7abd) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.332092 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e41d7abd) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:52.332092 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:52.332600 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:52.332600 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:52.332600 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:52.332600 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:52.332600 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(8cb4ab0c) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.332600 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(8cb4ab0c) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.332600 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:52.332600 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(8cb4ab0c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.332600 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(8cb4ab0c) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:52.335111 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:52.335111 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 34 bytes: 0020263bbc20ecd55ac4c46be835258e7562746d0a1953f97901938c40e48c13b57f
2026-02-02T15:31:52.335111 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:52.335111 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:52.335111 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:52.335111 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:52.336230 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:52.338751 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e104ec04) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.338751 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e104ec04) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.338751 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 0020263bbc20ecd55ac4c46be835258e7562746d0a1953f97901938c40e48c13b57f
2026-02-02T15:31:52.338751 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e104ec04) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.338751 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(e104ec04) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 263bbc20ecd55ac4c46be835258e7562746d0a1953f97901938c40e48c13b57f
2026-02-02T15:31:52.338751 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(58ba5648) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:52.338751 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(58ba5648) END (from buffer). Returning 32 bytes: 263bbc20ecd55ac4c46be835258e7562746d0a1953f97901938c40e48c13b57f. Buffer after: 0 bytes: 
2026-02-02T15:31:52.339751 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:52.348138 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:52.349142 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 202 bytes: 00c883278fd7443cca3a686ff691550be58df3171d509396956d6f7b43e0a08cf648f2d1ea2778ca39e891bc2dc16e033faf51006350273745597444da1e310f80ebc976dc47ed7729f5cd74e6ac6d1aec29f92759e780bd9047260c5dc6f85b2fddcdb302e1b3ada6f9c9aa8412988c6534c9ad863d36c25d7a18f94c31c85a88bd60b951f0ecf3750e56f7fb7540d891ca2ef93f395f78a0219cd819c0573f4b0ccf97e4c3bba261419fee373a15bedcd79fb400ef4fd8e4098117420a4e3e910fecb991adb992ef03
2026-02-02T15:31:52.349142 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 202 bytes successfully. Data preview (hex): 00c883278fd7443cca3a686ff691550be58df317...
2026-02-02T15:31:52.349142 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(93f29b40) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.349142 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(93f29b40) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.350141 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 34 bytes successfully. Data preview (hex): 0020263bbc20ecd55ac4c46be835258e7562746d...
2026-02-02T15:31:52.350141 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(032eaf06) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.350141 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(032eaf06) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.351646 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c883278fd7443cca3a686ff691550be58df3171d509396956d6f7b43e0a08cf648f2d1ea2778ca39e891bc2dc16e033faf51006350273745597444da1e310f80ebc976dc47ed7729f5cd74e6ac6d1aec29f92759e780bd9047260c5dc6f85b2fddcdb302e1b3ada6f9c9aa8412988c6534c9ad863d36c25d7a18f94c31c85a88bd60b951f0ecf3750e56f7fb7540d891ca2ef93f395f78a0219cd819c0573f4b0ccf97e4c3bba261419fee373a15bedcd79fb400ef4fd8e4098117420a4e3e910fecb991adb992ef03
2026-02-02T15:31:52.351646 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(032eaf06) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.351646 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(032eaf06) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 83278fd7443cca3a686ff691550be58df3171d509396956d6f7b43e0a08cf648f2d1ea2778ca39e891bc2dc16e033faf51006350273745597444da1e310f80ebc976dc47ed7729f5cd74e6ac6d1aec29f92759e780bd9047260c5dc6f85b2fddcdb302e1b3ada6f9c9aa8412988c6534c9ad863d36c25d7a18f94c31c85a88bd60b951f0ecf3750e56f7fb7540d891ca2ef93f395f78a0219cd819c0573f4b0ccf97e4c3bba261419fee373a15bedcd79fb400ef4fd8e4098117420a4e3e910fecb991adb992ef03
2026-02-02T15:31:52.352811 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(77989012) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:31:52.352811 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(77989012) END (from buffer). Returning 200 bytes: 83278fd7443cca3a686ff691550be58df3171d509396956d6f7b43e0a08cf648f2d1ea2778ca39e891bc2dc16e033faf51006350273745597444da1e310f80ebc976dc47ed7729f5cd74e6ac6d1aec29f92759e780bd9047260c5dc6f85b2fddcdb302e1b3ada6f9c9aa8412988c6534c9ad863d36c25d7a18f94c31c85a88bd60b951f0ecf3750e56f7fb7540d891ca2ef93f395f78a0219cd819c0573f4b0ccf97e4c3bba261419fee373a15bedcd79fb400ef4fd8e4098117420a4e3e910fecb991adb992ef03. Buffer after: 0 bytes: 
2026-02-02T15:31:52.352811 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:31:52.371406 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:52.371406 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 170 bytes: 00a88ececb32ba47acc7b640cff26ffb3e3f843cedeec75d1a2dce780c7d55f3c4af3189a3a4017c40341a6f2c7a3584633caa10a8d7c49c147f20c3dc5bc40c7fb107ca7af9fcbcd2830610a4c4e97b7dbc4567eb4b29570464de4a43429ab9508ac8904e2c2d651eb544be78588266d3a1087e4a3cc7eb6a300ae1364cf27eb6394d3835c6ee5ede0c23ced7ad3f52c7ec4cb075dab7ffbde7ecbceb9d981bed16f7bb3e5b02f98b79
2026-02-02T15:31:52.371406 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 170 bytes successfully. Data preview (hex): 00a88ececb32ba47acc7b640cff26ffb3e3f843c...
2026-02-02T15:31:52.372405 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.372405 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:52.372405 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1063372391
2026-02-02T15:31:52.372914 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1060920414
2026-02-02T15:31:52.372914 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.372914 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.372914 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.372914 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:52.372914 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:52.372914 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:52.372914 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 38 bytes: 002478b4f4101f3041b5676fb30e7f603d92624b084e2f0df638bc81858bc90a1afe483159ad
2026-02-02T15:31:52.374017 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (208 bytes): 00a88ececb32ba47acc7b640cff26ffb3e3f843cedeec75d1a2dce780c7d55f3c4af3189a3a4017c40341a6f2c7a3584633caa10a8d7c49c147f20c3dc5bc40c7fb107ca7af9fcbcd2830610a4c4e97b7dbc4567eb4b29570464de4a43429ab9508ac8904e2c2d651eb544be78588266d3a1087e4a3cc7eb6a300ae1364cf27eb6394d3835c6ee5ede0c23ced7ad3f52c7ec4cb075dab7ffbde7ecbceb9d981bed16f7bb3e5b02f98b79002478b4f4101f3041b5676fb30e7f603d92624b084e2f0df638bc81858bc90a1afe483159ad
2026-02-02T15:31:52.374017 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(93f29b40) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.374017 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(93f29b40) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 206 bytes: 8ececb32ba47acc7b640cff26ffb3e3f843cedeec75d1a2dce780c7d55f3c4af3189a3a4017c40341a6f2c7a3584633caa10a8d7c49c147f20c3dc5bc40c7fb107ca7af9fcbcd2830610a4c4e97b7dbc4567eb4b29570464de4a43429ab9508ac8904e2c2d651eb544be78588266d3a1087e4a3cc7eb6a300ae1364cf27eb6394d3835c6ee5ede0c23ced7ad3f52c7ec4cb075dab7ffbde7ecbceb9d981bed16f7bb3e5b02f98b79002478b4f4101f3041b5676fb30e7f603d92624b084e2f0df638bc81858bc90a1afe483159ad
2026-02-02T15:31:52.374017 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(c1ac07ca) START. Requested: 168. Buffer: 206 bytes.
2026-02-02T15:31:52.374017 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(c1ac07ca) END (from buffer). Returning 168 bytes: 8ececb32ba47acc7b640cff26ffb3e3f843cedeec75d1a2dce780c7d55f3c4af3189a3a4017c40341a6f2c7a3584633caa10a8d7c49c147f20c3dc5bc40c7fb107ca7af9fcbcd2830610a4c4e97b7dbc4567eb4b29570464de4a43429ab9508ac8904e2c2d651eb544be78588266d3a1087e4a3cc7eb6a300ae1364cf27eb6394d3835c6ee5ede0c23ced7ad3f52c7ec4cb075dab7ffbde7ecbceb9d981bed16f7bb3e5b02f98b79. Buffer after: 38 bytes: 002478b4f4101f3041b5676fb30e7f603d92624b084e2f0df638bc81858bc90a1afe483159ad
2026-02-02T15:31:52.374017 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:52.382265 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.382265 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:52.382265 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1060920414
2026-02-02T15:31:52.382265 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1063372391
2026-02-02T15:31:52.382265 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:52.382265 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.382265 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.382265 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.382265 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.383274 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(5d1bcf35) START. Requested: 2. Buffer: 38 bytes.
2026-02-02T15:31:52.383274 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(5d1bcf35) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 78b4f4101f3041b5676fb30e7f603d92624b084e2f0df638bc81858bc90a1afe483159ad
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:52.383274 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(98c21d70) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:52.383274 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(98c21d70) END (from buffer). Returning 36 bytes: 78b4f4101f3041b5676fb30e7f603d92624b084e2f0df638bc81858bc90a1afe483159ad. Buffer after: 0 bytes: 
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [120, 180, 244, 16]
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 78b4f4101f3041b5676fb30e7f603d92624b084e2f0df638bc81858bc90a1afe483159ad
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 78b4f4101f3041b5676fb30e7f603d92624b084e
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2f0df638bc81858bc90a1afe483159ad
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [120, 180, 244, 16]
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [47, 13, 246, 56]
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [47, 13, 246, 56, 188, 129, 133, 139, 201, 10, 26, 254, 72, 49, 89, 173]
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.383274 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063372391): [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.383274 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:52.384777 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.384777 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.384777 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.384777 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.384777 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.385295 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.385295 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:52.385295 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:52.385295 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:52.385295 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 38 bytes: 0024d5c6144a8ba86b2e10b7add94e7a91cb74ef732d7e08575598bb1afb41a1868caa0f0618
2026-02-02T15:31:52.385295 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 38 bytes successfully. Data preview (hex): 002478b4f4101f3041b5676fb30e7f603d92624b...
2026-02-02T15:31:52.385295 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.385295 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.385295 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.386365 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.386365 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.386365 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.386365 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.386365 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.386365 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1df773b1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.386365 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1df773b1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.387368 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024d5c6144a8ba86b2e10b7add94e7a91cb74ef732d7e08575598bb1afb41a1868caa0f0618
2026-02-02T15:31:52.387368 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1df773b1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.387872 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1df773b1) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: d5c6144a8ba86b2e10b7add94e7a91cb74ef732d7e08575598bb1afb41a1868caa0f0618
2026-02-02T15:31:52.387872 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:52.387872 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.387872 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:52.387872 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:52.387872 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:52.387872 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:52.388397 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:52.388397 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(9985603b) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:52.388397 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(9985603b) END (from buffer). Returning 36 bytes: d5c6144a8ba86b2e10b7add94e7a91cb74ef732d7e08575598bb1afb41a1868caa0f0618. Buffer after: 0 bytes: 
2026-02-02T15:31:52.388397 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [213, 198, 20, 74]
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: d5c6144a8ba86b2e10b7add94e7a91cb74ef732d7e08575598bb1afb41a1868caa0f0618
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d5c6144a8ba86b2e10b7add94e7a91cb74ef732d
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7e08575598bb1afb41a1868caa0f0618
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [213, 198, 20, 74]
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [126, 8, 87, 85]
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [126, 8, 87, 85, 152, 187, 26, 251, 65, 161, 134, 140, 170, 15, 6, 24]
2026-02-02T15:31:52.388397 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.388397 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:52.388397 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.388397 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.388397 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.389909 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.389909 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:52.389909 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:52.389909 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:52.389909 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 32 bytes: 001ea990b52d3ff9b814c814bed6d32e379c495b3fdb32c240e76e9532f1c1c7
2026-02-02T15:31:52.390912 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 38 bytes successfully. Data preview (hex): 0024d5c6144a8ba86b2e10b7add94e7a91cb74ef...
2026-02-02T15:31:52.390912 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:52.390912 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.390912 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.390912 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.390912 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.391421 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.391421 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.391421 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.391421 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.391421 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.391421 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(efdb1ca9) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.391421 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(efdb1ca9) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.391927 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001ea990b52d3ff9b814c814bed6d32e379c495b3fdb32c240e76e9532f1c1c7
2026-02-02T15:31:52.391927 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(efdb1ca9) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.391927 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(efdb1ca9) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: a990b52d3ff9b814c814bed6d32e379c495b3fdb32c240e76e9532f1c1c7
2026-02-02T15:31:52.391927 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:52.391927 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.391927 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:52.391927 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:52.391927 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:52.391927 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:52.391927 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:52.391927 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(a511989a) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:52.391927 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(a511989a) END (from buffer). Returning 30 bytes: a990b52d3ff9b814c814bed6d32e379c495b3fdb32c240e76e9532f1c1c7. Buffer after: 0 bytes: 
2026-02-02T15:31:52.393008 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [169, 144, 181, 45]
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: a990b52d3ff9b814c814bed6d32e379c495b3fdb32c240e76e9532f1c1c7
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a990b52d3ff9b814c814bed6d32e
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 379c495b3fdb32c240e76e9532f1c1c7
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [169, 144, 181, 45]
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [55, 156, 73, 91]
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [55, 156, 73, 91, 63, 219, 50, 194, 64, 231, 110, 149, 50, 241, 193, 199]
2026-02-02T15:31:52.393008 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.393008 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063372391): [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.394515 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:52.394515 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.394515 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.394515 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.394515 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:52.395297 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:52.395297 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:52.395297 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.395297 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:52.395297 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:52.395297 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:52.395297 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 32 bytes: 001e86bd989df6b1db4fdfe77cc595fc704d8e194de94fda1d6449fdb06ec1a1
2026-02-02T15:31:52.396301 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 32 bytes successfully. Data preview (hex): 001e86bd989df6b1db4fdfe77cc595fc704d8e19...
2026-02-02T15:31:52.396301 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:52.396301 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:52.396806 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:52.396806 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:52.396806 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912396-3335
2026-02-02T15:31:52.396806 [FINE] [SwarmConn] SwarmConn (2): Setting up health monitoring for connection to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.396806 [FINE] [SwarmConn] SwarmConn (2): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:52.397812 [FINE] [SwarmConn] SwarmConn (2): Context set: a70e2b5c-1bd3-4773-bdcd-c94ddceed1cd
2026-02-02T15:31:52.397812 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, conn_id=2
2026-02-02T15:31:52.397812 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc": 2
2026-02-02T15:31:52.398469 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Conn ID: 2, Direction: Direction.inbound
2026-02-02T15:31:52.398974 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.398974 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Conn ID: 2
2026-02-02T15:31:52.398974 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.398974 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.398974 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.398974 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:52.398974 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 32 bytes successfully. Data preview (hex): 001ea990b52d3ff9b814c814bed6d32e379c495b...
2026-02-02T15:31:52.398974 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.399988 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.399988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.399988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.399988 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.399988 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.399988 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.399988 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.399988 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(636127d2) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.399988 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(636127d2) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.400987 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e86bd989df6b1db4fdfe77cc595fc704d8e194de94fda1d6449fdb06ec1a1
2026-02-02T15:31:52.400987 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(636127d2) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.400987 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(636127d2) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 86bd989df6b1db4fdfe77cc595fc704d8e194de94fda1d6449fdb06ec1a1
2026-02-02T15:31:52.400987 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:52.400987 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:52.400987 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(b1d18967) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:52.400987 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(b1d18967) END (from buffer). Returning 30 bytes: 86bd989df6b1db4fdfe77cc595fc704d8e194de94fda1d6449fdb06ec1a1. Buffer after: 0 bytes: 
2026-02-02T15:31:52.400987 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [134, 189, 152, 157]
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 86bd989df6b1db4fdfe77cc595fc704d8e194de94fda1d6449fdb06ec1a1
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 86bd989df6b1db4fdfe77cc595fc
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 704d8e194de94fda1d6449fdb06ec1a1
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [134, 189, 152, 157]
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [112, 77, 142, 25]
2026-02-02T15:31:52.400987 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [112, 77, 142, 25, 77, 233, 79, 218, 29, 100, 73, 253, 176, 110, 193, 161]
2026-02-02T15:31:52.402676 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.402676 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.402676 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:52.402676 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.402676 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.402676 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.402676 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:52.402676 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:52.402676 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:52.402676 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912402-539
2026-02-02T15:31:52.404192 [FINE] [SwarmConn] SwarmConn (1): Setting up health monitoring for connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.404192 [FINE] [SwarmConn] SwarmConn (1): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:52.404192 [FINE] [SwarmConn] SwarmConn (1): Context set: 1709c68c-0c8f-4807-aa6c-17e013302e0c
2026-02-02T15:31:52.404192 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz: 86ms
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.404192 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.404192 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.404192 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.404192 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(9b961600) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.404192 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(9b961600) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.404192 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.404192 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.404192 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.404192 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.405711 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.405711 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(c11aa872) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.405711 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(c11aa872) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.424487 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 1, Direction: Direction.outbound
2026-02-02T15:31:52.424487 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.424487 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 1
2026-02-02T15:31:52.424487 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.424487 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.424487 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:52.425442 [FINE] [SwarmConn] SwarmConn.newStream (1): Entered to peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Context HashCode: 596361965
2026-02-02T15:31:52.425442 [FINE] [SwarmConn] SwarmConn.newStream (1): Connection is open.
2026-02-02T15:31:52.425442 [FINE] [SwarmConn] SwarmConn.newStream (1): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:52.425442 [FINE] [SwarmConn] SwarmConn.newStream (1): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:52.425947 [FINE] [YamuxStream] [5][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:52.426463 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.426463 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:52.426463 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Conn ID: 1
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.426463 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 30 bytes: 001c64304a44c78928fc5053e055bc07a361ab74ea6f0798d2560f4e9be8
2026-02-02T15:31:52.426463 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c64304a44c78928fc5053e055bc07a361ab74ea6f0798d2560f4e9be8
2026-02-02T15:31:52.426463 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(9b961600) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.426463 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(9b961600) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 64304a44c78928fc5053e055bc07a361ab74ea6f0798d2560f4e9be8
2026-02-02T15:31:52.426463 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.426463 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.426463 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.427978 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(633785df) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.427978 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(633785df) END (from buffer). Returning 28 bytes: 64304a44c78928fc5053e055bc07a361ab74ea6f0798d2560f4e9be8. Buffer after: 0 bytes: 
2026-02-02T15:31:52.427978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [100, 48, 74, 68]
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 64304a44c78928fc5053e055bc07a361ab74ea6f0798d2560f4e9be8
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 64304a44c78928fc5053e055
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: bc07a361ab74ea6f0798d2560f4e9be8
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [100, 48, 74, 68]
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [188, 7, 163, 97]
2026-02-02T15:31:52.427978 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [188, 7, 163, 97, 171, 116, 234, 111, 7, 152, 210, 86, 15, 78, 155, 232]
2026-02-02T15:31:52.427978 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.428493 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063372391): [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.428493 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:52.428493 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.428493 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.428493 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.429003 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.429003 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.429003 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:52.429518 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.429518 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.429518 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 30 bytes: 001cce3b23f97b02471e59bd8e6b21fea477c36d794be3313d14724934a8
2026-02-02T15:31:52.430029 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 30 bytes successfully. Data preview (hex): 001c64304a44c78928fc5053e055bc07a361ab74...
2026-02-02T15:31:52.430029 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cce3b23f97b02471e59bd8e6b21fea477c36d794be3313d14724934a8
2026-02-02T15:31:52.430029 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(c11aa872) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.430029 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(c11aa872) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: ce3b23f97b02471e59bd8e6b21fea477c36d794be3313d14724934a8
2026-02-02T15:31:52.430029 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.430659 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.430659 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(576c7c07) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.430659 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(576c7c07) END (from buffer). Returning 28 bytes: ce3b23f97b02471e59bd8e6b21fea477c36d794be3313d14724934a8. Buffer after: 0 bytes: 
2026-02-02T15:31:52.430659 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [206, 59, 35, 249]
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: ce3b23f97b02471e59bd8e6b21fea477c36d794be3313d14724934a8
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ce3b23f97b02471e59bd8e6b
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 21fea477c36d794be3313d14724934a8
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [206, 59, 35, 249]
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [33, 254, 164, 119]
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [33, 254, 164, 119, 195, 109, 121, 75, 227, 49, 61, 20, 114, 73, 52, 168]
2026-02-02T15:31:52.430659 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.430659 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.432216 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:52.432216 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.432216 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.432216 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.432216 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.432216 [FINER] [YamuxStream] [5][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:52.432216 [FINER] [YamuxStream] [5][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:52.432216 [FINE] [YamuxStream] [5][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:52.432216 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:52.433230 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:52.433230 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.433230 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.433230 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 30 bytes: 001cb96bb3eb2f69e0a96a522ec3ef2096ff85bf128b47bcbf85b03e813b
2026-02-02T15:31:52.433230 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 30 bytes successfully. Data preview (hex): 001cce3b23f97b02471e59bd8e6b21fea477c36d...
2026-02-02T15:31:52.433230 [FINE] [YamuxStream] [4][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:52.433230 [FINER] [YamuxStream] [4][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:52.433230 [FINE] [YamuxStream] [4][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:52.433230 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:52.433230 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:52.433230 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.433230 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.434735 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 30 bytes: 001cb48551c96994535548476c2718cabbed687d6958d7d50f78f55fc76b
2026-02-02T15:31:52.434735 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.434735 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.434735 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.435252 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.435252 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.435252 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.435252 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.435252 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.435252 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.435252 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1e75580e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.435252 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1e75580e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.435252 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cb96bb3eb2f69e0a96a522ec3ef2096ff85bf128b47bcbf85b03e813b
2026-02-02T15:31:52.435252 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 30 bytes successfully. Data preview (hex): 001cb96bb3eb2f69e0a96a522ec3ef2096ff85bf...
2026-02-02T15:31:52.435252 [FINE] [SwarmConn] SwarmConn.newStream (1): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:52.435252 [FINE] [SwarmConn] SwarmConn.newStream (1): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:52.435252 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067912435-7693 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.436393 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:52.436393 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:52.436393 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0, duration=10ms
2026-02-02T15:31:52.436393 [FINE] [YamuxStream] [5][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:22.436393
2026-02-02T15:31:52.436393 [FINE] [YamuxStream] [5][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:52.436393 [INFO] [SwarmConn] SwarmConn (1): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.436393 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (1): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:52.436393 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:52.436393 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:52.437899 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:52.437899 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:52.437899 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 50 bytes: 0030a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba6d02ea60f17bba910da5aa9dd6be82dc
2026-02-02T15:31:52.437899 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 50 bytes successfully. Data preview (hex): 0030a2891ed5fe07501783ee719c2a013a452e49...
2026-02-02T15:31:52.437899 [FINE] [YamuxStream] [5][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:52.438920 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.438920 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cb48551c96994535548476c2718cabbed687d6958d7d50f78f55fc76b
2026-02-02T15:31:52.438920 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1e75580e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.438920 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(1e75580e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: b48551c96994535548476c2718cabbed687d6958d7d50f78f55fc76b
2026-02-02T15:31:52.438920 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.438920 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.438920 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.438920 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.438920 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.438920 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.438920 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.438920 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(ee63e90b) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.439919 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(ee63e90b) END (from buffer). Returning 28 bytes: b48551c96994535548476c2718cabbed687d6958d7d50f78f55fc76b. Buffer after: 0 bytes: 
2026-02-02T15:31:52.439919 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [180, 133, 81, 201]
2026-02-02T15:31:52.439919 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.439919 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b48551c96994535548476c2718cabbed687d6958d7d50f78f55fc76b
2026-02-02T15:31:52.440422 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.440422 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.440422 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b48551c96994535548476c27
2026-02-02T15:31:52.440422 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 18cabbed687d6958d7d50f78f55fc76b
2026-02-02T15:31:52.440422 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [180, 133, 81, 201]
2026-02-02T15:31:52.440422 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [24, 202, 187, 237]
2026-02-02T15:31:52.440422 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [24, 202, 187, 237, 104, 125, 105, 88, 215, 213, 15, 120, 245, 95, 199, 107]
2026-02-02T15:31:52.440926 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.440926 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.440926 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:52.440926 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.440926 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:52.440926 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.441581 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.441581 [FINER] [YamuxStream] [5][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:31:52.441581 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 30 bytes successfully. Data preview (hex): 001cb48551c96994535548476c2718cabbed687d...
2026-02-02T15:31:52.441581 [FINER] [YamuxStream] [4][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:52.442092 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc on conn 2
2026-02-02T15:31:52.442092 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067912442-7672 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.442092 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:52.442092 [FINEST] [YamuxStream] [4][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.442092 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba6d02ea60f17bba910da5aa9dd6be82dc
2026-02-02T15:31:52.442092 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.442092 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.442092 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.442092 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.442092 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.443236 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.443236 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.443236 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.443236 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.443236 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6fde0558) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.443236 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6fde0558) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.443236 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.443236 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.443236 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.443236 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.443236 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.443236 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.443236 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.443236 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.444237 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.444237 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(786d2a8a) START. Requested: 2. Buffer: 80 bytes.
2026-02-02T15:31:52.444237 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(786d2a8a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: b96bb3eb2f69e0a96a522ec3ef2096ff85bf128b47bcbf85b03e813b0030a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba6d02ea60f17bba910da5aa9dd6be82dc
2026-02-02T15:31:52.444741 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.444741 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.444741 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.444741 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.444741 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.444741 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.444741 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.444741 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(7a13151f) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:31:52.444741 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(7a13151f) END (from buffer). Returning 28 bytes: b96bb3eb2f69e0a96a522ec3ef2096ff85bf128b47bcbf85b03e813b. Buffer after: 50 bytes: 0030a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba6d02ea60f17bba910da5aa9dd6be82dc
2026-02-02T15:31:52.444741 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [185, 107, 179, 235]
2026-02-02T15:31:52.444741 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b96bb3eb2f69e0a96a522ec3ef2096ff85bf128b47bcbf85b03e813b
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b96bb3eb2f69e0a96a522ec3
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ef2096ff85bf128b47bcbf85b03e813b
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [185, 107, 179, 235]
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [239, 32, 150, 255]
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [239, 32, 150, 255, 133, 191, 18, 139, 71, 188, 191, 133, 176, 62, 129, 59]
2026-02-02T15:31:52.445747 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.445747 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063372391): [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.445747 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:52.446751 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.446751 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:52.446751 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.446751 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.446751 [FINER] [YamuxStream] [4][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:52.447255 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.447255 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.447255 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.447255 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.447255 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.447759 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.447759 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(939dfd8a) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:52.447759 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(939dfd8a) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba6d02ea60f17bba910da5aa9dd6be82dc
2026-02-02T15:31:52.447759 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:52.447759 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:52.447759 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(80220524) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:52.447759 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(80220524) END (from buffer). Returning 48 bytes: a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba6d02ea60f17bba910da5aa9dd6be82dc. Buffer after: 0 bytes: 
2026-02-02T15:31:52.447759 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [162, 137, 30, 213]
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba6d02ea60f17bba910da5aa9dd6be82dc
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a2891ed5fe07501783ee719c2a013a452e494c7983afb6fb0cbeb653387729ba
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 6d02ea60f17bba910da5aa9dd6be82dc
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [162, 137, 30, 213]
2026-02-02T15:31:52.447759 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [109, 2, 234, 96]
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [109, 2, 234, 96, 241, 123, 186, 145, 13, 165, 170, 157, 214, 190, 130, 220]
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063372391): [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.449237 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:52.449237 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:52.449237 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:52.449237 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.449237 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.449237 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:52.449237 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:52.449237 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:52.450743 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 50 bytes: 003064b120a841f80d9b28768292e22c7b241a07fd6913c7fecb94b399a65fe3c3386c264b1819438f1c182ac81fe2b29375
2026-02-02T15:31:52.450743 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 50 bytes successfully. Data preview (hex): 003064b120a841f80d9b28768292e22c7b241a07...
2026-02-02T15:31:52.450743 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:52.450743 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:52.450743 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.450743 [FINEST] [YamuxStream] [4][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.450743 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.450743 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.450743 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.450743 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.450743 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.450743 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.450743 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.451748 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.451748 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(40637d92) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.451748 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(40637d92) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.451748 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 003064b120a841f80d9b28768292e22c7b241a07fd6913c7fecb94b399a65fe3c3386c264b1819438f1c182ac81fe2b29375
2026-02-02T15:31:52.451748 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6fde0558) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.451748 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6fde0558) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 64b120a841f80d9b28768292e22c7b241a07fd6913c7fecb94b399a65fe3c3386c264b1819438f1c182ac81fe2b29375
2026-02-02T15:31:52.451748 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:52.451748 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:52.451748 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(f9c17427) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:52.451748 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(f9c17427) END (from buffer). Returning 48 bytes: 64b120a841f80d9b28768292e22c7b241a07fd6913c7fecb94b399a65fe3c3386c264b1819438f1c182ac81fe2b29375. Buffer after: 0 bytes: 
2026-02-02T15:31:52.451748 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [100, 177, 32, 168]
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 64b120a841f80d9b28768292e22c7b241a07fd6913c7fecb94b399a65fe3c3386c264b1819438f1c182ac81fe2b29375
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:52.451748 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 64b120a841f80d9b28768292e22c7b241a07fd6913c7fecb94b399a65fe3c338
2026-02-02T15:31:52.452810 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 6c264b1819438f1c182ac81fe2b29375
2026-02-02T15:31:52.452810 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [100, 177, 32, 168]
2026-02-02T15:31:52.452810 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [108, 38, 75, 24]
2026-02-02T15:31:52.452810 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [108, 38, 75, 24, 25, 67, 143, 28, 24, 42, 200, 31, 226, 178, 147, 117]
2026-02-02T15:31:52.452810 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.452810 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.452810 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:52.452810 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:52.453810 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:52.453810 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.453810 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.453810 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:52.453810 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.453810 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.453810 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.454316 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:52.454316 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:52.454316 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.454316 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:52.454316 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.454316 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:52.454316 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:52.454316 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:52.454316 [FINE] [YamuxStream] [5][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:52.454316 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:52.454316 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:52.454316 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:52.454316 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:52.455820 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 46 bytes: 002ca4a1eeebe7d7f91a47db907f3686ebd892d5e8ceaf2ea21cd8ec5596e9b98b7ce6d1d1cd076f791743dba0bf
2026-02-02T15:31:52.455820 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 46 bytes successfully. Data preview (hex): 002ca4a1eeebe7d7f91a47db907f3686ebd892d5...
2026-02-02T15:31:52.455820 [FINE] [YamuxStream] [5][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:31:52.455820 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.455820 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.455820 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.456825 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.456825 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.456825 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.456825 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.456825 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.456825 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.456825 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.456825 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(23de7047) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.456825 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(23de7047) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.456825 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002ca4a1eeebe7d7f91a47db907f3686ebd892d5e8ceaf2ea21cd8ec5596e9b98b7ce6d1d1cd076f791743dba0bf
2026-02-02T15:31:52.456825 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(40637d92) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.456825 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(40637d92) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: a4a1eeebe7d7f91a47db907f3686ebd892d5e8ceaf2ea21cd8ec5596e9b98b7ce6d1d1cd076f791743dba0bf
2026-02-02T15:31:52.456825 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:52.456825 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:52.457824 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:52.457824 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(db77b25e) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:52.457824 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(db77b25e) END (from buffer). Returning 44 bytes: a4a1eeebe7d7f91a47db907f3686ebd892d5e8ceaf2ea21cd8ec5596e9b98b7ce6d1d1cd076f791743dba0bf. Buffer after: 0 bytes: 
2026-02-02T15:31:52.457824 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [164, 161, 238, 235]
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: a4a1eeebe7d7f91a47db907f3686ebd892d5e8ceaf2ea21cd8ec5596e9b98b7ce6d1d1cd076f791743dba0bf
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a4a1eeebe7d7f91a47db907f3686ebd892d5e8ceaf2ea21cd8ec5596
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e9b98b7ce6d1d1cd076f791743dba0bf
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [164, 161, 238, 235]
2026-02-02T15:31:52.457824 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [233, 185, 139, 124]
2026-02-02T15:31:52.458823 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [233, 185, 139, 124, 230, 209, 209, 205, 7, 111, 121, 23, 67, 219, 160, 191]
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.458823 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063372391): [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:52.458823 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:52.458823 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.458823 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.459824 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:52.459824 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:52.459824 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.459824 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:52.459824 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.459824 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:52.459824 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:52.459824 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:52.459824 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:52.459824 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:52.459824 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:52.459824 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:52.460823 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:52.460823 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:52.460823 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:52.460823 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:52.460823 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 46 bytes: 002cbdb309516500f04c58828ae0bd649f36e92aa01d4db661161e5049c2896b047f0c8aa62e157ad88f05bfd8c1
2026-02-02T15:31:52.461823 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.461823 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.461823 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.461823 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.461823 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.461823 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.461823 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.461823 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.461823 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.461823 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(46ea8759) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.461823 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(46ea8759) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.462822 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002cbdb309516500f04c58828ae0bd649f36e92aa01d4db661161e5049c2896b047f0c8aa62e157ad88f05bfd8c1
2026-02-02T15:31:52.462822 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(23de7047) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.462822 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(23de7047) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: bdb309516500f04c58828ae0bd649f36e92aa01d4db661161e5049c2896b047f0c8aa62e157ad88f05bfd8c1
2026-02-02T15:31:52.462822 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:52.462822 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.462822 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:52.462822 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:52.462822 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:52.475764 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:52.475764 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:52.475764 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(bca1c11d) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:52.475764 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(bca1c11d) END (from buffer). Returning 44 bytes: bdb309516500f04c58828ae0bd649f36e92aa01d4db661161e5049c2896b047f0c8aa62e157ad88f05bfd8c1. Buffer after: 0 bytes: 
2026-02-02T15:31:52.475764 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [189, 179, 9, 81]
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: bdb309516500f04c58828ae0bd649f36e92aa01d4db661161e5049c2896b047f0c8aa62e157ad88f05bfd8c1
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: bdb309516500f04c58828ae0bd649f36e92aa01d4db661161e5049c2
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 896b047f0c8aa62e157ad88f05bfd8c1
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [189, 179, 9, 81]
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [137, 107, 4, 127]
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [137, 107, 4, 127, 12, 138, 166, 46, 21, 122, 216, 143, 5, 191, 216, 193]
2026-02-02T15:31:52.476269 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.476269 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:52.476269 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:52.476269 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.476269 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.476269 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:52.476269 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.477784 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.477784 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.477784 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:52.477784 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:52.477784 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.477784 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:52.477784 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.478300 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:52.478300 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:52.478300 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:52.478300 [FINE] [YamuxStream] [5][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:22.478300
2026-02-02T15:31:52.478300 [FINE] [StreamScopeImpl] stream-1770067912435-7693: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.478300 [FINE] [StreamScopeImpl] stream-1770067912435-7693: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:52.478300 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:52.479304 [FINE] [StreamScopeImpl] stream-1770067912435-7693: Setting service to libp2p.identify for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, protocol /ipfs/id/1.0.0
2026-02-02T15:31:52.479304 [FINE] [StreamScopeImpl] stream-1770067912435-7693: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:52.479304 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.479810 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 46 bytes successfully. Data preview (hex): 002cbdb309516500f04c58828ae0bd649f36e92a...
2026-02-02T15:31:52.479810 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 19ms
2026-02-02T15:31:52.479810 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:52.479810 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:52.479810 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:52.479810 [FINE] [StreamScopeImpl] stream-1770067912442-7672: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.479810 [FINE] [StreamScopeImpl] stream-1770067912442-7672: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:52.479810 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:52.479810 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc (reported as 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc) on stream 1
2026-02-02T15:31:52.479810 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false. Stream ID: 1
2026-02-02T15:31:52.479810 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false. Stream ID: 1
2026-02-02T15:31:52.480814 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.480814 [FINE] [StreamScopeImpl] stream-1770067912442-7672: Setting service to libp2p.identify for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, protocol /ipfs/id/1.0.0
2026-02-02T15:31:52.480814 [FINE] [StreamScopeImpl] stream-1770067912442-7672: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:52.480814 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.480814 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc: seq=3, protocols=6, addrs=2
2026-02-02T15:31:52.480814 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Snapshot seq: 3
2026-02-02T15:31:52.480814 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58548 for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.480814 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4102, RemoteAddr: /ip4/127.0.0.1/tcp/58548, ViaLoopback: true for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.480814 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.481813 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.481813 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.481813 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:52.481813 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:52.481813 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.481813 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58548)
2026-02-02T15:31:52.481813 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Total message size: 414 bytes. SignedPeerRecord present: true
2026-02-02T15:31:52.481813 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 414).
2026-02-02T15:31:52.481813 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 416 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:52.482813 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 428, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160, 158, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:31:52.482813 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:52.482813 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 444 bytes (plaintext was 428)
2026-02-02T15:31:52.482813 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 446
2026-02-02T15:31:52.482813 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 446 bytes: 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
2026-02-02T15:31:52.483789 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.483789 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.484793 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.484793 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.484793 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.484793 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.484793 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.484793 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.484793 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.485298 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6bbad18f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.485298 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6bbad18f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.485298 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (446 bytes): 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
2026-02-02T15:31:52.485298 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6bbad18f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.485298 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(6bbad18f) END (from buffer). Returning 2 bytes: 01bc. Buffer after: 444 bytes: 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
2026-02-02T15:31:52.485298 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 188]
2026-02-02T15:31:52.485298 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.485298 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 188]
2026-02-02T15:31:52.486310 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01bc
2026-02-02T15:31:52.486310 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 444
2026-02-02T15:31:52.486310 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 444
2026-02-02T15:31:52.486310 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 444 more bytes (have 0/444)
2026-02-02T15:31:52.486310 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(cbe7120f) START. Requested: 444. Buffer: 444 bytes.
2026-02-02T15:31:52.486310 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(cbe7120f) END (from buffer). Returning 444 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:31:52.486310 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 444 bytes. First 4 bytes: [69, 149, 173, 209]
2026-02-02T15:31:52.487482 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 444, Got: 444
2026-02-02T15:31:52.487482 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 444, Bytes: 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
2026-02-02T15:31:52.487482 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 444
2026-02-02T15:31:52.487482 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(428) and MAC(16)
2026-02-02T15:31:52.487482 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:31:52.487482 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1974c755c9a4fd2674998a28523feb6c
2026-02-02T15:31:52.488482 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [69, 149, 173, 209]
2026-02-02T15:31:52.488482 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [25, 116, 199, 85]
2026-02-02T15:31:52.488482 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [25, 116, 199, 85, 201, 164, 253, 38, 116, 153, 138, 40, 82, 63, 235, 108]
2026-02-02T15:31:52.488482 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.488482 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.488482 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 428 bytes
2026-02-02T15:31:52.488482 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 428 bytes to _decryptedBuffer. New _decryptedBuffer.length: 428
2026-02-02T15:31:52.488482 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 416. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160]
2026-02-02T15:31:52.488482 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.488482 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.489988 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=416
2026-02-02T15:31:52.489988 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.489988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.489988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.489988 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=416
2026-02-02T15:31:52.489988 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 416, _decryptedBuffer.length: 416
2026-02-02T15:31:52.489988 [FINER] [SecuredConnection] SecuredConnection.read (length=416): Returning 416 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [158, 3, 10, 36, 8, 1, 18, 32, 10, 164, 141, 210, 6, 184, 66, 185, 2, 158, 10, 114]
2026-02-02T15:31:52.489988 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=416
2026-02-02T15:31:52.489988 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.489988 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 416, flags: 0
2026-02-02T15:31:52.489988 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 416 bytes directly to waiting reader
2026-02-02T15:31:52.489988 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 452
2026-02-02T15:31:52.491010 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, 414 bytes, duration=11ms
2026-02-02T15:31:52.491010 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. IsPush: false.
2026-02-02T15:31:52.491010 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 6
2026-02-02T15:31:52.491010 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 6
2026-02-02T15:31:52.491010 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 6, After: 6
2026-02-02T15:31:52.491010 [FINER] [identify] IdentifyService._diff: Added: 0, Removed: 0
2026-02-02T15:31:52.491010 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Added protocols: 0, Removed protocols: 0
2026-02-02T15:31:52.492008 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: /ip4/127.0.0.1/tcp/58548
2026-02-02T15:31:52.492008 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58548 for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN via conn 1.
2026-02-02T15:31:52.492008 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.492008 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.492008 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (181 bytes).
2026-02-02T15:31:52.492008 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:52.492008 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:52.500854 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:52.500854 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: true
2026-02-02T15:31:52.500854 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:52.500854 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:52.501369 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:52.501369 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.501369 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.501369 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from record public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.501369 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.501369 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Found 2 addresses.
2026-02-02T15:31:52.502704 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:52.502704 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN based on remote connection address /ip4/127.0.0.1/tcp/4102. Before filter: 2
2026-02-02T15:31:52.502704 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4102 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:52.502704 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:52.503418 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:52.503418 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:52.503933 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.503933 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:52.504951 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.504951 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from local peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.504951 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.504951 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.505457 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.505457 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches expected remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.505975 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Comparing with received key.
2026-02-02T15:31:52.505975 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches existing key in peerstore.
2026-02-02T15:31:52.505975 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.505975 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN in peerstore.
2026-02-02T15:31:52.505975 [FINE] [autonatv2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN identification completed, updating peer map
2026-02-02T15:31:52.505975 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports push.
2026-02-02T15:31:52.505975 [FINER] [YamuxStream] [5][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:52.505975 [FINER] [YamuxStream] [5][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:52.506979 [FINE] [autonatv2] Updating peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:31:52.506979 [FINE] [autonatv2] Adding peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:52.506979 [FINE] [ambient_autonat_v2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports AutoNAT v2, scheduling probe
2026-02-02T15:31:52.506979 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:52.507485 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.507485 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:52.507485 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.507996 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.507996 [FINER] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Writing 30 bytes: 001cdcbccc87aa9c538ee6f2494f9dbc8aead3d55f3b9d93c1258e263f49
2026-02-02T15:31:52.507996 [FINEST] [TCPConnection] TCPConnection.write (id: 9a618d92-0933-4c4c-b17a-188bd42e0b80): Flushed 30 bytes successfully. Data preview (hex): 001cdcbccc87aa9c538ee6f2494f9dbc8aead3d5...
2026-02-02T15:31:52.507996 [FINE] [YamuxStream] [5][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:52.509071 [FINE] [YamuxStream] [5][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:52.509071 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, duration=83ms
2026-02-02T15:31:52.509071 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:52.509071 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz...
2026-02-02T15:31:52.510316 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Context HashCode: 317055360
2026-02-02T15:31:52.510316 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz.
2026-02-02T15:31:52.510316 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz).
2026-02-02T15:31:52.511380 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz, existing_conns=1
2026-02-02T15:31:52.511380 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz"
2026-02-02T15:31:52.511380 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz"
2026-02-02T15:31:52.511380 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Dialing.
2026-02-02T15:31:52.511380 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:52.511380 [FINE] [Swarm] Dialing 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:52.512379 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 446 bytes successfully. Data preview (hex): 01bc4595add1008e5edc7df8588904870e9e519c...
2026-02-02T15:31:52.512379 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 416 bytes in 30ms
2026-02-02T15:31:52.512379 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.513380 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.513380 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.513380 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc to 3.
2026-02-02T15:31:52.513887 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.513887 [FINER] [YamuxStream] [4][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:52.513887 [FINER] [YamuxStream] [4][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:52.513887 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.513887 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:52.514892 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.514892 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.514892 [FINER] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Writing 30 bytes: 001c2d2478041fbb7363bb79438eef11739d3e014feddf674f34eba260b2
2026-02-02T15:31:52.514892 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.514892 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.514892 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.514892 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.514892 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.515967 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.515967 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(7146060b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.515967 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(7146060b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.515967 [FINEST] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cdcbccc87aa9c538ee6f2494f9dbc8aead3d55f3b9d93c1258e263f49
2026-02-02T15:31:52.515967 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(46ea8759) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.515967 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(46ea8759) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: dcbccc87aa9c538ee6f2494f9dbc8aead3d55f3b9d93c1258e263f49
2026-02-02T15:31:52.515967 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.515967 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.515967 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.517309 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(18b05d00) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.517309 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(18b05d00) END (from buffer). Returning 28 bytes: dcbccc87aa9c538ee6f2494f9dbc8aead3d55f3b9d93c1258e263f49. Buffer after: 0 bytes: 
2026-02-02T15:31:52.517309 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [220, 188, 204, 135]
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: dcbccc87aa9c538ee6f2494f9dbc8aead3d55f3b9d93c1258e263f49
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: dcbccc87aa9c538ee6f2494f
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9dbc8aead3d55f3b9d93c1258e263f49
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [220, 188, 204, 135]
2026-02-02T15:31:52.517309 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [157, 188, 138, 234]
2026-02-02T15:31:52.518309 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [157, 188, 138, 234, 211, 213, 95, 59, 157, 147, 193, 37, 142, 38, 63, 73]
2026-02-02T15:31:52.518309 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.518309 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063372391): [59, 39, 121, 172, 202, 51, 252, 64, 164, 161, 115, 147, 208, 43, 187, 14, 163, 212, 72, 3, 128, 24, 31, 120, 167, 20, 2, 218, 11, 28, 204, 145]
2026-02-02T15:31:52.518870 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:52.518870 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.518870 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.518870 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.518870 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.518870 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:52.518870 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:52.518870 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:31:52.518870 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4102 (priority 1)
2026-02-02T15:31:52.519881 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:52.520880 [FINEST] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c2d2478041fbb7363bb79438eef11739d3e014feddf674f34eba260b2
2026-02-02T15:31:52.520880 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(7146060b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.522387 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(7146060b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 2d2478041fbb7363bb79438eef11739d3e014feddf674f34eba260b2
2026-02-02T15:31:52.522387 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.522387 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.522387 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.522387 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.522387 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.522387 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.522387 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.523405 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(2ac415af) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.523405 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(2ac415af) END (from buffer). Returning 28 bytes: 2d2478041fbb7363bb79438eef11739d3e014feddf674f34eba260b2. Buffer after: 0 bytes: 
2026-02-02T15:31:52.523405 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [45, 36, 120, 4]
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 2d2478041fbb7363bb79438eef11739d3e014feddf674f34eba260b2
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2d2478041fbb7363bb79438e
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ef11739d3e014feddf674f34eba260b2
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [45, 36, 120, 4]
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [239, 17, 115, 157]
2026-02-02T15:31:52.523405 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [239, 17, 115, 157, 62, 1, 79, 237, 223, 103, 79, 52, 235, 162, 96, 178]
2026-02-02T15:31:52.523405 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.524764 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060920414): [47, 123, 152, 141, 32, 31, 97, 14, 235, 34, 30, 222, 36, 148, 193, 127, 243, 10, 196, 92, 64, 150, 34, 187, 169, 21, 244, 188, 200, 166, 29, 13]
2026-02-02T15:31:52.525269 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:52.525269 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.525269 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.525269 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.525269 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.525782 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:52.525782 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:52.525782 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:52.525782 [FINEST] [TCPConnection] TCPConnection.write (id: 6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79): Flushed 30 bytes successfully. Data preview (hex): 001c2d2478041fbb7363bb79438eef11739d3e01...
2026-02-02T15:31:52.525782 [FINE] [YamuxStream] [4][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.closing.
2026-02-02T15:31:52.526786 [FINE] [YamuxStream] [4][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.closing.
2026-02-02T15:31:52.526786 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:52.526786 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false.
2026-02-02T15:31:52.526786 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.527290 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.527290 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.527290 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.527290 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.527290 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.527290 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.527290 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.527290 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.527290 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(1fd1cc10) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.527290 [FINER] [TCPConnection] TCPConnection(6a819f0e-4e41-4e84-8e6d-eb8f8c0e3d79) - Read(1fd1cc10) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.533085 [FINE] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4102, Socket Remote: 127.0.0.1:58549
2026-02-02T15:31:52.533085 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912533-614
2026-02-02T15:31:52.534590 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:52.534590 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c714310e) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.534590 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c714310e) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.544564 [FINE] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58549, Socket Remote: 127.0.0.1:4102
2026-02-02T15:31:52.545068 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912544-539
2026-02-02T15:31:52.545068 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWLppdQWVbCt9m1RqBxKHd9R9Cd1NPRTBQCv9zdS26f9x5
2026-02-02T15:31:52.545582 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.546594 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:52.546594 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3843283e) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.546594 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3843283e) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.546594 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.547594 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.547594 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.547594 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.547594 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.547594 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.547594 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.547594 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.547594 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.548099 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(37ce446a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.548099 [FINER] [TCPConnection] TCPConnection(9a618d92-0933-4c4c-b17a-188bd42e0b80) - Read(37ce446a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.548498 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.549512 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c714310e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.549512 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c714310e) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:52.549512 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.549512 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.549512 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.550501 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:52.551005 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:52.551005 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.551005 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(0a7afec7) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.551005 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(0a7afec7) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.552011 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:52.552011 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3843283e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.552011 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3843283e) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:52.552011 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:52.552011 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:52.552011 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(f3d0f443) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:52.553024 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(f3d0f443) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:52.557970 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:52.557970 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(0a7afec7) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.557970 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(0a7afec7) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:52.557970 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:52.557970 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:52.557970 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:52.557970 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:52.558985 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:52.558985 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:52.558985 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:52.558985 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:52.558985 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:52.563764 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(4a7071a1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.563764 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(4a7071a1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.564348 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:52.564348 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(f3d0f443) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.564348 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(f3d0f443) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:52.566893 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:52.566893 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 34 bytes: 00202fe55548cab480ce159d2f2b68b36e3ff8dfd215e13aace035f37c1899142047
2026-02-02T15:31:52.567896 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 00202fe55548cab480ce159d2f2b68b36e3ff8dfd215e13aace035f37c1899142047
2026-02-02T15:31:52.567896 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(4a7071a1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.567896 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(4a7071a1) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 2fe55548cab480ce159d2f2b68b36e3ff8dfd215e13aace035f37c1899142047
2026-02-02T15:31:52.567896 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(fe934a20) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:52.567896 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(fe934a20) END (from buffer). Returning 32 bytes: 2fe55548cab480ce159d2f2b68b36e3ff8dfd215e13aace035f37c1899142047. Buffer after: 0 bytes: 
2026-02-02T15:31:52.568400 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:52.578360 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:52.579368 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 202 bytes: 00c8fe1925ec07411cb91b208c74bf4ad7d16aec728c82514120bd9ef2a16c05c07aa9874cd3e51b6de4ccce7127354d355d842da4805b6c056cc1f24868dad0fc3f5562ab8fc3fe9fc975345560b902dd99719b494740803c4fc51525ec1a1888f2bfbafe106f7b451d51acc8dea53b239d37f432333f76e34b50538fe8ec161f4d30cedf464ffc4a13467ac027e2761740d4a3c9efe5b2fe3e2c458e9ff1b2476929f6c42e4d14481f012da6c0d2930db4760c90c73ace6073145f7159873014dfb2aefa03559b8f48
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:52.579368 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:52.579368 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 34 bytes successfully. Data preview (hex): 00202fe55548cab480ce159d2f2b68b36e3ff8df...
2026-02-02T15:31:52.579874 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(1267d2f4) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.579874 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(1267d2f4) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.579874 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c8fe1925ec07411cb91b208c74bf4ad7d16aec728c82514120bd9ef2a16c05c07aa9874cd3e51b6de4ccce7127354d355d842da4805b6c056cc1f24868dad0fc3f5562ab8fc3fe9fc975345560b902dd99719b494740803c4fc51525ec1a1888f2bfbafe106f7b451d51acc8dea53b239d37f432333f76e34b50538fe8ec161f4d30cedf464ffc4a13467ac027e2761740d4a3c9efe5b2fe3e2c458e9ff1b2476929f6c42e4d14481f012da6c0d2930db4760c90c73ace6073145f7159873014dfb2aefa03559b8f48
2026-02-02T15:31:52.579874 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(1267d2f4) ASYNC AWOKE. Re-checking buffer.
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:52.579874 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58540 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:52.579874 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(1267d2f4) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: fe1925ec07411cb91b208c74bf4ad7d16aec728c82514120bd9ef2a16c05c07aa9874cd3e51b6de4ccce7127354d355d842da4805b6c056cc1f24868dad0fc3f5562ab8fc3fe9fc975345560b902dd99719b494740803c4fc51525ec1a1888f2bfbafe106f7b451d51acc8dea53b239d37f432333f76e34b50538fe8ec161f4d30cedf464ffc4a13467ac027e2761740d4a3c9efe5b2fe3e2c458e9ff1b2476929f6c42e4d14481f012da6c0d2930db4760c90c73ace6073145f7159873014dfb2aefa03559b8f48
2026-02-02T15:31:52.579874 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(d5c0b27f) START. Requested: 200. Buffer: 200 bytes.
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:52.579874 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58540: ServerSocket closed.
2026-02-02T15:31:52.579874 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/58540 connectionStream is done. Removing listener.
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:52.579874 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(d5c0b27f) END (from buffer). Returning 200 bytes: fe1925ec07411cb91b208c74bf4ad7d16aec728c82514120bd9ef2a16c05c07aa9874cd3e51b6de4ccce7127354d355d842da4805b6c056cc1f24868dad0fc3f5562ab8fc3fe9fc975345560b902dd99719b494740803c4fc51525ec1a1888f2bfbafe106f7b451d51acc8dea53b239d37f432333f76e34b50538fe8ec161f4d30cedf464ffc4a13467ac027e2761740d4a3c9efe5b2fe3e2c458e9ff1b2476929f6c42e4d14481f012da6c0d2930db4760c90c73ace6073145f7159873014dfb2aefa03559b8f48. Buffer after: 0 bytes: 
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:52.580887 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58540 already closed.
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:52.580887 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:52.580887 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58540: ConnectionController closed.
2026-02-02T15:31:52.580887 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWSfzJKwo4D85q8rhL9tdBv77PGsgzBuJNNew4BjDgGMye
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:52.597438 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:52.597438 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 170 bytes: 00a8cb760fa786f86da462350ba2bf79589e4d81b8e5912274891069146e58d27fe4e66752bc1404de3c2aa8e96e346f030500170ad6d8ee0b884f2ba7e400df5792cfd483f87b271bff0801b700952fda620054a0d3d1f05ffb07c605b12a074359cd405b137b6fe7542ee6bb55e797302591062a79798a3d2201d6764aa170526d1a0e53a411a3964f6a59688d1815dcf0c767bdc8dc2ebafef244014dac80505ade38e1dc1f4adb3e
2026-02-02T15:31:52.598023 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 170 bytes successfully. Data preview (hex): 00a8cb760fa786f86da462350ba2bf79589e4d81...
2026-02-02T15:31:52.598023 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.598023 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:52.598023 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059679356
2026-02-02T15:31:52.598023 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1057885709
2026-02-02T15:31:52.598023 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.598023 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.598023 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.598023 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:52.599096 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:52.599096 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:52.599096 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 38 bytes: 00248df2f14912784788801f61b29d646fb3da28e1e4620885b6f5990082ffba5c4bd995796b
2026-02-02T15:31:52.599096 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 202 bytes successfully. Data preview (hex): 00c8fe1925ec07411cb91b208c74bf4ad7d16aec...
2026-02-02T15:31:52.599096 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(477629a8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.599096 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(477629a8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.599096 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (170 bytes): 00a8cb760fa786f86da462350ba2bf79589e4d81b8e5912274891069146e58d27fe4e66752bc1404de3c2aa8e96e346f030500170ad6d8ee0b884f2ba7e400df5792cfd483f87b271bff0801b700952fda620054a0d3d1f05ffb07c605b12a074359cd405b137b6fe7542ee6bb55e797302591062a79798a3d2201d6764aa170526d1a0e53a411a3964f6a59688d1815dcf0c767bdc8dc2ebafef244014dac80505ade38e1dc1f4adb3e
2026-02-02T15:31:52.599096 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(477629a8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.599096 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(477629a8) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 168 bytes: cb760fa786f86da462350ba2bf79589e4d81b8e5912274891069146e58d27fe4e66752bc1404de3c2aa8e96e346f030500170ad6d8ee0b884f2ba7e400df5792cfd483f87b271bff0801b700952fda620054a0d3d1f05ffb07c605b12a074359cd405b137b6fe7542ee6bb55e797302591062a79798a3d2201d6764aa170526d1a0e53a411a3964f6a59688d1815dcf0c767bdc8dc2ebafef244014dac80505ade38e1dc1f4adb3e
2026-02-02T15:31:52.599096 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(e306069f) START. Requested: 168. Buffer: 168 bytes.
2026-02-02T15:31:52.599096 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(e306069f) END (from buffer). Returning 168 bytes: cb760fa786f86da462350ba2bf79589e4d81b8e5912274891069146e58d27fe4e66752bc1404de3c2aa8e96e346f030500170ad6d8ee0b884f2ba7e400df5792cfd483f87b271bff0801b700952fda620054a0d3d1f05ffb07c605b12a074359cd405b137b6fe7542ee6bb55e797302591062a79798a3d2201d6764aa170526d1a0e53a411a3964f6a59688d1815dcf0c767bdc8dc2ebafef244014dac80505ade38e1dc1f4adb3e. Buffer after: 0 bytes: 
2026-02-02T15:31:52.599096 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:52.608854 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.608854 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:52.608854 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1057885709
2026-02-02T15:31:52.609854 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059679356
2026-02-02T15:31:52.609854 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:52.609854 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.609854 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.609854 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.609854 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.609854 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.609854 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.609854 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.609854 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.609854 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.609854 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.610854 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(b943289e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.610854 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(b943289e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.610854 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 38 bytes successfully. Data preview (hex): 00248df2f14912784788801f61b29d646fb3da28...
2026-02-02T15:31:52.610854 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.610854 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.610854 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.610854 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.610854 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.610854 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.610854 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.610854 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.610854 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6c201771) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.610854 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6c201771) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.611854 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 00248df2f14912784788801f61b29d646fb3da28e1e4620885b6f5990082ffba5c4bd995796b
2026-02-02T15:31:52.611854 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(b943289e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.611854 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(b943289e) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 8df2f14912784788801f61b29d646fb3da28e1e4620885b6f5990082ffba5c4bd995796b
2026-02-02T15:31:52.611854 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:52.611854 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:52.611854 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(ba569178) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:52.611854 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(ba569178) END (from buffer). Returning 36 bytes: 8df2f14912784788801f61b29d646fb3da28e1e4620885b6f5990082ffba5c4bd995796b. Buffer after: 0 bytes: 
2026-02-02T15:31:52.611854 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [141, 242, 241, 73]
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 8df2f14912784788801f61b29d646fb3da28e1e4620885b6f5990082ffba5c4bd995796b
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8df2f14912784788801f61b29d646fb3da28e1e4
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 620885b6f5990082ffba5c4bd995796b
2026-02-02T15:31:52.611854 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [141, 242, 241, 73]
2026-02-02T15:31:52.613359 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [98, 8, 133, 182]
2026-02-02T15:31:52.613359 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [98, 8, 133, 182, 245, 153, 0, 130, 255, 186, 92, 75, 217, 149, 121, 107]
2026-02-02T15:31:52.613359 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.613359 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.613359 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:52.613359 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.613359 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.613359 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.613359 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.613359 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.613359 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.613359 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:52.613359 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:52.614912 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:52.614912 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 38 bytes: 002499a3e6991dc836c94df95ec7de5700d08bcdad8c144d85b541cbadb4ec4f3193643ee6d8
2026-02-02T15:31:52.614912 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 38 bytes successfully. Data preview (hex): 002499a3e6991dc836c94df95ec7de5700d08bcd...
2026-02-02T15:31:52.614912 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:52.614912 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.614912 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.614912 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.615677 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.615677 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.615677 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.615677 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.615677 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.615677 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.615677 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(643658a8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.615677 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(643658a8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.616570 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 002499a3e6991dc836c94df95ec7de5700d08bcdad8c144d85b541cbadb4ec4f3193643ee6d8
2026-02-02T15:31:52.616570 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6c201771) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.616570 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6c201771) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 99a3e6991dc836c94df95ec7de5700d08bcdad8c144d85b541cbadb4ec4f3193643ee6d8
2026-02-02T15:31:52.616570 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:52.616570 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.616570 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:52.616570 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:52.616570 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:52.616570 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:52.616570 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:52.616570 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(a228d918) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:52.616570 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(a228d918) END (from buffer). Returning 36 bytes: 99a3e6991dc836c94df95ec7de5700d08bcdad8c144d85b541cbadb4ec4f3193643ee6d8. Buffer after: 0 bytes: 
2026-02-02T15:31:52.616570 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [153, 163, 230, 153]
2026-02-02T15:31:52.616570 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 99a3e6991dc836c94df95ec7de5700d08bcdad8c144d85b541cbadb4ec4f3193643ee6d8
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 99a3e6991dc836c94df95ec7de5700d08bcdad8c
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 144d85b541cbadb4ec4f3193643ee6d8
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [153, 163, 230, 153]
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [20, 77, 133, 181]
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [20, 77, 133, 181, 65, 203, 173, 180, 236, 79, 49, 147, 100, 62, 230, 216]
2026-02-02T15:31:52.617573 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.617573 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:52.617573 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.617573 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.617573 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.618968 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.618968 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:52.618968 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:52.618968 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:52.618968 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 32 bytes: 001e0c2401e0821f176c1165d74b0a015ce817322fa25f4fc8f3d89691d880e1
2026-02-02T15:31:52.618968 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e0c2401e0821f176c1165d74b0a015ce817322fa25f4fc8f3d89691d880e1
2026-02-02T15:31:52.618968 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(643658a8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.618968 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(643658a8) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 0c2401e0821f176c1165d74b0a015ce817322fa25f4fc8f3d89691d880e1
2026-02-02T15:31:52.618968 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:52.618968 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:52.619981 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:52.619981 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c6c6efaf) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:52.619981 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c6c6efaf) END (from buffer). Returning 30 bytes: 0c2401e0821f176c1165d74b0a015ce817322fa25f4fc8f3d89691d880e1. Buffer after: 0 bytes: 
2026-02-02T15:31:52.619981 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [12, 36, 1, 224]
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 0c2401e0821f176c1165d74b0a015ce817322fa25f4fc8f3d89691d880e1
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 0c2401e0821f176c1165d74b0a01
2026-02-02T15:31:52.619981 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5ce817322fa25f4fc8f3d89691d880e1
2026-02-02T15:31:52.620981 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [12, 36, 1, 224]
2026-02-02T15:31:52.620981 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [92, 232, 23, 50]
2026-02-02T15:31:52.620981 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [92, 232, 23, 50, 47, 162, 95, 79, 200, 243, 216, 150, 145, 216, 128, 225]
2026-02-02T15:31:52.620981 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.620981 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.620981 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:52.620981 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.620981 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.621982 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.621982 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:52.621982 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:52.621982 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:52.621982 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:52.621982 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:52.621982 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:52.621982 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:52.621982 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 32 bytes: 001e9313167e9ef0dbd641edca2ab9b71e4026b619a5673cf9f2e6529e1289e7
2026-02-02T15:31:52.622982 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 32 bytes successfully. Data preview (hex): 001e9313167e9ef0dbd641edca2ab9b71e4026b6...
2026-02-02T15:31:52.622982 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:52.622982 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:52.622982 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:52.622982 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:52.623487 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912623-614
2026-02-02T15:31:52.623487 [FINE] [SwarmConn] SwarmConn (3): Setting up health monitoring for connection to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.623487 [FINE] [SwarmConn] SwarmConn (3): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:52.623487 [FINE] [SwarmConn] SwarmConn (3): Context set: adea4fe1-e3de-45d9-9ab0-3a3eda849f70
2026-02-02T15:31:52.623487 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, conn_id=3
2026-02-02T15:31:52.623487 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc": 3
2026-02-02T15:31:52.623487 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Conn ID: 3, Direction: Direction.inbound
2026-02-02T15:31:52.623487 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.623487 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Conn ID: 3
2026-02-02T15:31:52.624492 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.624492 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.624492 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.624492 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:52.624492 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 32 bytes successfully. Data preview (hex): 001e0c2401e0821f176c1165d74b0a015ce81732...
2026-02-02T15:31:52.624492 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:52.624492 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.624492 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.624492 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.624492 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:52.624492 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:52.624492 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.625491 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.625491 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3591b39f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.625491 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3591b39f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.625491 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e9313167e9ef0dbd641edca2ab9b71e4026b619a5673cf9f2e6529e1289e7
2026-02-02T15:31:52.625491 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3591b39f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.625491 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3591b39f) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 9313167e9ef0dbd641edca2ab9b71e4026b619a5673cf9f2e6529e1289e7
2026-02-02T15:31:52.625995 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:52.625995 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:52.625995 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6e4ec305) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:52.625995 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6e4ec305) END (from buffer). Returning 30 bytes: 9313167e9ef0dbd641edca2ab9b71e4026b619a5673cf9f2e6529e1289e7. Buffer after: 0 bytes: 
2026-02-02T15:31:52.625995 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [147, 19, 22, 126]
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 9313167e9ef0dbd641edca2ab9b71e4026b619a5673cf9f2e6529e1289e7
2026-02-02T15:31:52.625995 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:52.626780 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:52.626780 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9313167e9ef0dbd641edca2ab9b7
2026-02-02T15:31:52.626780 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1e4026b619a5673cf9f2e6529e1289e7
2026-02-02T15:31:52.626780 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [147, 19, 22, 126]
2026-02-02T15:31:52.626780 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [30, 64, 38, 182]
2026-02-02T15:31:52.626780 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [30, 64, 38, 182, 25, 165, 103, 60, 249, 242, 230, 82, 158, 18, 137, 231]
2026-02-02T15:31:52.626780 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.626780 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.626780 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:52.627785 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.627785 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:52.627785 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.628289 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:52.628289 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4102
2026-02-02T15:31:52.628289 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:52.628289 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067912628-539
2026-02-02T15:31:52.628289 [FINE] [SwarmConn] SwarmConn (2): Setting up health monitoring for connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.628289 [FINE] [SwarmConn] SwarmConn (2): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:52.628289 [FINE] [SwarmConn] SwarmConn (2): Context set: bcc625d0-2a1d-4c12-9a34-eb826c76af6b
2026-02-02T15:31:52.628289 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz: 116ms
2026-02-02T15:31:52.629293 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.630209 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.630209 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.630209 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.630209 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.630209 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.630209 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.630714 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.630714 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.630714 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c817c922) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.630714 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c817c922) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.630714 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.631100 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.631100 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.631100 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.631100 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.631100 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.631100 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.631100 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.631100 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.631604 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0088e8ae) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.631604 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0088e8ae) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.644166 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 2, Direction: Direction.outbound
2026-02-02T15:31:52.644166 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.644669 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Conn ID: 2
2026-02-02T15:31:52.644669 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.644669 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.644669 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:52.644669 [FINE] [SwarmConn] SwarmConn.newStream (2): Entered to peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Context HashCode: 142906671
2026-02-02T15:31:52.644669 [FINE] [SwarmConn] SwarmConn.newStream (2): Connection is open.
2026-02-02T15:31:52.644669 [FINE] [SwarmConn] SwarmConn.newStream (2): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:52.644669 [FINE] [SwarmConn] SwarmConn.newStream (2): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:52.644669 [FINE] [YamuxStream] [7][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:52.646185 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.646185 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.646185 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:52.646185 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Conn ID: 2
2026-02-02T15:31:52.646185 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Conn runtimeType: SwarmConn, Conn ID: 2, Conn local: 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, Conn remote: 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.646185 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz on SwarmConn 2.
2026-02-02T15:31:52.646185 [FINE] [SwarmConn] SwarmConn.newStream (2): Entered to peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Context HashCode: 317055360
2026-02-02T15:31:52.646185 [FINE] [SwarmConn] SwarmConn.newStream (2): Connection is open.
2026-02-02T15:31:52.646185 [FINE] [SwarmConn] SwarmConn.newStream (2): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:52.646185 [FINE] [SwarmConn] SwarmConn.newStream (2): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:52.646185 [FINE] [YamuxStream] [7][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:52.647704 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.647704 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.647704 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 30 bytes: 001c5fbe9cd3c1625cc8a92c2c43a977f4906beff231403b593ae2566e44
2026-02-02T15:31:52.647704 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 30 bytes successfully. Data preview (hex): 001c5fbe9cd3c1625cc8a92c2c43a977f4906bef...
2026-02-02T15:31:52.647704 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:52.647704 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:52.648880 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.648880 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.648880 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 30 bytes: 001c09e9bbea953ffcd0cf640701324cca01072220fed29aece456cf0d52
2026-02-02T15:31:52.649880 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 30 bytes successfully. Data preview (hex): 001c09e9bbea953ffcd0cf640701324cca010722...
2026-02-02T15:31:52.649880 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001c5fbe9cd3c1625cc8a92c2c43a977f4906beff231403b593ae2566e44001c09e9bbea953ffcd0cf640701324cca01072220fed29aece456cf0d52
2026-02-02T15:31:52.649880 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c817c922) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.649880 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c817c922) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 5fbe9cd3c1625cc8a92c2c43a977f4906beff231403b593ae2566e44001c09e9bbea953ffcd0cf640701324cca01072220fed29aece456cf0d52
2026-02-02T15:31:52.649880 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.649880 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.649880 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.649880 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.649880 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.650884 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.650884 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(112eb04f) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:31:52.650884 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(112eb04f) END (from buffer). Returning 28 bytes: 5fbe9cd3c1625cc8a92c2c43a977f4906beff231403b593ae2566e44. Buffer after: 30 bytes: 001c09e9bbea953ffcd0cf640701324cca01072220fed29aece456cf0d52
2026-02-02T15:31:52.650884 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [95, 190, 156, 211]
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 5fbe9cd3c1625cc8a92c2c43a977f4906beff231403b593ae2566e44
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5fbe9cd3c1625cc8a92c2c43
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a977f4906beff231403b593ae2566e44
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [95, 190, 156, 211]
2026-02-02T15:31:52.650884 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [169, 119, 244, 144]
2026-02-02T15:31:52.651392 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [169, 119, 244, 144, 107, 239, 242, 49, 64, 59, 89, 58, 226, 86, 110, 68]
2026-02-02T15:31:52.651392 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.651392 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.651392 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:52.651392 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.651392 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.651392 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.651392 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.651392 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.651392 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:52.651392 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.651392 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.651392 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 30 bytes: 001ca3b3e9348af35c8d019b03524c1dc8ba1e95609c38f7d241aac132c7
2026-02-02T15:31:52.652896 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 30 bytes successfully. Data preview (hex): 001ca3b3e9348af35c8d019b03524c1dc8ba1e95...
2026-02-02T15:31:52.652896 [FINE] [YamuxStream] [6][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:52.652896 [FINER] [YamuxStream] [6][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:52.652896 [FINE] [YamuxStream] [6][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:52.652896 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:52.652896 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:52.652896 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.652896 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.652896 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 30 bytes: 001ce8f7ef46f0a1ef0cbaea18cc93c3d072d8f2dfb2b215c14a109206ac
2026-02-02T15:31:52.654509 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 30 bytes successfully. Data preview (hex): 001ce8f7ef46f0a1ef0cbaea18cc93c3d072d8f2...
2026-02-02T15:31:52.654509 [FINER] [YamuxStream] [6][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:52.654509 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc on conn 3
2026-02-02T15:31:52.656023 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067912656-7672 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.656023 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:52.657029 [FINEST] [YamuxStream] [6][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.657029 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ca3b3e9348af35c8d019b03524c1dc8ba1e95609c38f7d241aac132c7
2026-02-02T15:31:52.657029 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0088e8ae) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.657029 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0088e8ae) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: a3b3e9348af35c8d019b03524c1dc8ba1e95609c38f7d241aac132c7
2026-02-02T15:31:52.657029 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.657029 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.657029 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.657029 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.657029 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.657029 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.657029 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.657029 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(230e9bc1) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.658027 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(230e9bc1) END (from buffer). Returning 28 bytes: a3b3e9348af35c8d019b03524c1dc8ba1e95609c38f7d241aac132c7. Buffer after: 0 bytes: 
2026-02-02T15:31:52.658027 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [163, 179, 233, 52]
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: a3b3e9348af35c8d019b03524c1dc8ba1e95609c38f7d241aac132c7
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a3b3e9348af35c8d019b0352
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 4c1dc8ba1e95609c38f7d241aac132c7
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [163, 179, 233, 52]
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [76, 29, 200, 186]
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [76, 29, 200, 186, 30, 149, 96, 156, 56, 247, 210, 65, 170, 193, 50, 199]
2026-02-02T15:31:52.658027 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.658027 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.659026 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:52.659026 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.659026 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.659026 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.659026 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.659026 [FINER] [YamuxStream] [7][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:52.659026 [FINER] [YamuxStream] [7][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:52.659026 [FINE] [YamuxStream] [7][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:52.659026 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:52.659026 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:52.660026 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.660026 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.660026 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 30 bytes: 001c945dd8f523ab39146dc2c6b4759f8d6da80c1ef815241103e6687295
2026-02-02T15:31:52.660026 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 30 bytes successfully. Data preview (hex): 001c945dd8f523ab39146dc2c6b4759f8d6da80c...
2026-02-02T15:31:52.660026 [FINE] [SwarmConn] SwarmConn.newStream (2): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:52.660026 [FINE] [SwarmConn] SwarmConn.newStream (2): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:52.660026 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067912660-7693 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.660026 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:52.660026 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:52.661026 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0, duration=16ms
2026-02-02T15:31:52.661026 [FINE] [YamuxStream] [7][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:22.661026
2026-02-02T15:31:52.661026 [FINE] [YamuxStream] [7][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:52.661026 [INFO] [SwarmConn] SwarmConn (2): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.661026 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (2): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:52.661026 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:52.661026 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:52.661026 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:52.661026 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:52.661026 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 50 bytes: 0030c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94743c0efa1935223eb42b819e92f29dd3
2026-02-02T15:31:52.662025 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.662025 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.662025 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.662025 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.662025 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.662025 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.662025 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.662025 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.662025 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.662025 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(8029fed1) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:52.662025 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(8029fed1) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 09e9bbea953ffcd0cf640701324cca01072220fed29aece456cf0d52
2026-02-02T15:31:52.663026 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.663026 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.663026 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c0ca002d) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.663026 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(c0ca002d) END (from buffer). Returning 28 bytes: 09e9bbea953ffcd0cf640701324cca01072220fed29aece456cf0d52. Buffer after: 0 bytes: 
2026-02-02T15:31:52.663026 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [9, 233, 187, 234]
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 09e9bbea953ffcd0cf640701324cca01072220fed29aece456cf0d52
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 09e9bbea953ffcd0cf640701
2026-02-02T15:31:52.663026 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 324cca01072220fed29aece456cf0d52
2026-02-02T15:31:52.664025 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [9, 233, 187, 234]
2026-02-02T15:31:52.664025 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [50, 76, 202, 1]
2026-02-02T15:31:52.664025 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [50, 76, 202, 1, 7, 34, 32, 254, 210, 154, 236, 228, 86, 207, 13, 82]
2026-02-02T15:31:52.664025 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.664025 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.664025 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:52.664025 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.664025 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:52.664025 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.664025 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.665024 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:52.665024 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:52.665024 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.665024 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.665024 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 30 bytes: 001cc09b0a078d5ee0700c828ab312fd65a2bab737e1a675c8c3cf1fe423
2026-02-02T15:31:52.665024 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001ce8f7ef46f0a1ef0cbaea18cc93c3d072d8f2dfb2b215c14a109206ac001cc09b0a078d5ee0700c828ab312fd65a2bab737e1a675c8c3cf1fe423
2026-02-02T15:31:52.665024 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.666024 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.666024 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.666024 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.666024 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.666024 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.666024 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(48afc111) START. Requested: 2. Buffer: 60 bytes.
2026-02-02T15:31:52.666024 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(48afc111) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: e8f7ef46f0a1ef0cbaea18cc93c3d072d8f2dfb2b215c14a109206ac001cc09b0a078d5ee0700c828ab312fd65a2bab737e1a675c8c3cf1fe423
2026-02-02T15:31:52.666024 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.666024 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.667024 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.667024 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3ecfd4ab) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:31:52.667024 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3ecfd4ab) END (from buffer). Returning 28 bytes: e8f7ef46f0a1ef0cbaea18cc93c3d072d8f2dfb2b215c14a109206ac. Buffer after: 30 bytes: 001cc09b0a078d5ee0700c828ab312fd65a2bab737e1a675c8c3cf1fe423
2026-02-02T15:31:52.667024 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [232, 247, 239, 70]
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e8f7ef46f0a1ef0cbaea18cc93c3d072d8f2dfb2b215c14a109206ac
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e8f7ef46f0a1ef0cbaea18cc
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 93c3d072d8f2dfb2b215c14a109206ac
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [232, 247, 239, 70]
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [147, 195, 208, 114]
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [147, 195, 208, 114, 216, 242, 223, 178, 178, 21, 193, 74, 16, 146, 6, 172]
2026-02-02T15:31:52.667024 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.667024 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.668023 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:52.668023 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.668023 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:52.668023 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.668023 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.668023 [FINER] [YamuxStream] [7][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:52.668023 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c945dd8f523ab39146dc2c6b4759f8d6da80c1ef815241103e6687295
2026-02-02T15:31:52.668023 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 50 bytes successfully. Data preview (hex): 0030c275c95e19df7bc87de0f21c4a1d248a765b...
2026-02-02T15:31:52.668023 [FINE] [YamuxStream] [7][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 6ms
2026-02-02T15:31:52.669023 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.673021 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 30 bytes successfully. Data preview (hex): 001cc09b0a078d5ee0700c828ab312fd65a2bab7...
2026-02-02T15:31:52.673021 [FINE] [YamuxStream] [6][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:52.673021 [FINER] [YamuxStream] [6][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:52.673021 [FINE] [YamuxStream] [6][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:52.673021 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:52.673021 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:52.674022 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.674022 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.674022 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 30 bytes: 001cd48d30680917bc06875dbe8302e44bea9aeca19be3e4692f82641bcc
2026-02-02T15:31:52.674022 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 30 bytes successfully. Data preview (hex): 001cd48d30680917bc06875dbe8302e44bea9aec...
2026-02-02T15:31:52.675023 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:52.675023 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc on conn 3
2026-02-02T15:31:52.675023 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067912675-7672 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.675544 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:52.675544 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.676048 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cd48d30680917bc06875dbe8302e44bea9aeca19be3e4692f82641bcc
2026-02-02T15:31:52.676048 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.676048 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.676048 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.676048 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.676561 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.676561 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.676561 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6f8c4176) START. Requested: 2. Buffer: 60 bytes.
2026-02-02T15:31:52.676561 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(6f8c4176) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: c09b0a078d5ee0700c828ab312fd65a2bab737e1a675c8c3cf1fe423001cd48d30680917bc06875dbe8302e44bea9aeca19be3e4692f82641bcc
2026-02-02T15:31:52.676561 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.676561 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.676561 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.676561 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(36e91b08) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:31:52.677565 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(36e91b08) END (from buffer). Returning 28 bytes: c09b0a078d5ee0700c828ab312fd65a2bab737e1a675c8c3cf1fe423. Buffer after: 30 bytes: 001cd48d30680917bc06875dbe8302e44bea9aeca19be3e4692f82641bcc
2026-02-02T15:31:52.677565 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [192, 155, 10, 7]
2026-02-02T15:31:52.677565 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.677565 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c09b0a078d5ee0700c828ab312fd65a2bab737e1a675c8c3cf1fe423
2026-02-02T15:31:52.677565 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.677565 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.677565 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c09b0a078d5ee0700c828ab3
2026-02-02T15:31:52.677565 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 12fd65a2bab737e1a675c8c3cf1fe423
2026-02-02T15:31:52.678068 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [192, 155, 10, 7]
2026-02-02T15:31:52.678068 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [18, 253, 101, 162]
2026-02-02T15:31:52.678068 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [18, 253, 101, 162, 186, 183, 55, 225, 166, 117, 200, 195, 207, 31, 228, 35]
2026-02-02T15:31:52.678068 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.678068 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.678068 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 12 bytes
2026-02-02T15:31:52.678068 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.678068 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:52.678068 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.678068 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.679447 [FINER] [YamuxStream] [7][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:52.679447 [FINER] [YamuxStream] [7][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:52.679447 [FINE] [YamuxStream] [7][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:52.679952 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:52.680266 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:52.680266 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.680266 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.680266 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 30 bytes: 001ce537947504b351baa5f68458c0522d30679bf465c3bb2a3ef31b7e7e
2026-02-02T15:31:52.680804 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94743c0efa1935223eb42b819e92f29dd3
2026-02-02T15:31:52.680804 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.680804 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.680804 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.680804 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.680804 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.680804 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.680804 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.680804 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.680804 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.680804 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(eb6581be) START. Requested: 2. Buffer: 80 bytes.
2026-02-02T15:31:52.680804 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(eb6581be) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: 945dd8f523ab39146dc2c6b4759f8d6da80c1ef815241103e66872950030c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94743c0efa1935223eb42b819e92f29dd3
2026-02-02T15:31:52.682373 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.682373 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.682373 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(9031d4c9) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:31:52.682373 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(9031d4c9) END (from buffer). Returning 28 bytes: 945dd8f523ab39146dc2c6b4759f8d6da80c1ef815241103e6687295. Buffer after: 50 bytes: 0030c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94743c0efa1935223eb42b819e92f29dd3
2026-02-02T15:31:52.682373 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [148, 93, 216, 245]
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 945dd8f523ab39146dc2c6b4759f8d6da80c1ef815241103e6687295
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 945dd8f523ab39146dc2c6b4
2026-02-02T15:31:52.682373 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 759f8d6da80c1ef815241103e6687295
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [148, 93, 216, 245]
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [117, 159, 141, 109]
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [117, 159, 141, 109, 168, 12, 30, 248, 21, 36, 17, 3, 230, 104, 114, 149]
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 12 bytes
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.683391 [FINER] [YamuxStream] [6][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.683391 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.683391 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.684895 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.684895 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(436bc22a) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:52.684895 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(436bc22a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: d48d30680917bc06875dbe8302e44bea9aeca19be3e4692f82641bcc
2026-02-02T15:31:52.684895 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.684895 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.684895 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.684895 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.684895 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.685417 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.685417 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(23554d30) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.685417 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(23554d30) END (from buffer). Returning 28 bytes: d48d30680917bc06875dbe8302e44bea9aeca19be3e4692f82641bcc. Buffer after: 0 bytes: 
2026-02-02T15:31:52.685417 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [212, 141, 48, 104]
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: d48d30680917bc06875dbe8302e44bea9aeca19be3e4692f82641bcc
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d48d30680917bc06875dbe83
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 02e44bea9aeca19be3e4692f82641bcc
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [212, 141, 48, 104]
2026-02-02T15:31:52.685417 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [2, 228, 75, 234]
2026-02-02T15:31:52.686428 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [2, 228, 75, 234, 154, 236, 161, 155, 227, 228, 105, 47, 130, 100, 27, 204]
2026-02-02T15:31:52.686428 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.686428 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.686428 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 12 bytes
2026-02-02T15:31:52.687429 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.687936 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:52.687936 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.687936 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.687936 [FINER] [YamuxStream] [7][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:52.687936 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 30 bytes successfully. Data preview (hex): 001ce537947504b351baa5f68458c0522d30679b...
2026-02-02T15:31:52.687936 [FINE] [SwarmConn] SwarmConn.newStream (2): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:31:52.687936 [FINE] [SwarmConn] SwarmConn.newStream (2): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:31:52.687936 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067912687-7693 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.687936 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:52.688940 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:31:52.688940 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
2026-02-02T15:31:52.688940 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:31:52.688940 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ce537947504b351baa5f68458c0522d30679bf465c3bb2a3ef31b7e7e
2026-02-02T15:31:52.688940 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.688940 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.688940 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.688940 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.688940 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.688940 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.688940 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.688940 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.688940 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.688940 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(786cbaa7) START. Requested: 2. Buffer: 80 bytes.
2026-02-02T15:31:52.688940 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(786cbaa7) END (from buffer). Returning 2 bytes: 0030. Buffer after: 78 bytes: c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94743c0efa1935223eb42b819e92f29dd3001ce537947504b351baa5f68458c0522d30679bf465c3bb2a3ef31b7e7e
2026-02-02T15:31:52.689939 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:52.689939 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:52.689939 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(3bfdd3fe) START. Requested: 48. Buffer: 78 bytes.
2026-02-02T15:31:52.689939 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(3bfdd3fe) END (from buffer). Returning 48 bytes: c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94743c0efa1935223eb42b819e92f29dd3. Buffer after: 30 bytes: 001ce537947504b351baa5f68458c0522d30679bf465c3bb2a3ef31b7e7e
2026-02-02T15:31:52.689939 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [194, 117, 201, 94]
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94743c0efa1935223eb42b819e92f29dd3
2026-02-02T15:31:52.689939 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:52.690443 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:52.690443 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c275c95e19df7bc87de0f21c4a1d248a765bd30a3ec08a8f17c1a9f6eb11ec94
2026-02-02T15:31:52.690443 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 743c0efa1935223eb42b819e92f29dd3
2026-02-02T15:31:52.690443 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [194, 117, 201, 94]
2026-02-02T15:31:52.690443 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [116, 60, 14, 250]
2026-02-02T15:31:52.690443 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [116, 60, 14, 250, 25, 53, 34, 62, 180, 43, 129, 158, 146, 242, 157, 211]
2026-02-02T15:31:52.690443 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.690443 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 32 bytes
2026-02-02T15:31:52.690947 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:52.690947 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.690947 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:52.690947 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:52.690947 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.691952 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:52.691952 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.691952 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:52.691952 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:52.691952 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:52.692458 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.692458 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.692458 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:52.692458 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:52.692458 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:52.692458 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:52.692458 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:52.692458 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 50 bytes: 0030bf8fe3819743d0be689eda7d7aaa527a779657b0d79b48718c3ef17bf29822bf95a1953536cdf6ec3a2c1d7327c9a4c9
2026-02-02T15:31:52.692458 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.693470 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.693470 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.693470 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.693470 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(e20e6096) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.693470 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(e20e6096) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.693470 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.693470 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.693470 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.693470 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.693470 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(583f602e) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:52.694469 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(583f602e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: e537947504b351baa5f68458c0522d30679bf465c3bb2a3ef31b7e7e
2026-02-02T15:31:52.694469 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.694469 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.694469 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(353a71aa) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.694469 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(353a71aa) END (from buffer). Returning 28 bytes: e537947504b351baa5f68458c0522d30679bf465c3bb2a3ef31b7e7e. Buffer after: 0 bytes: 
2026-02-02T15:31:52.694469 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [229, 55, 148, 117]
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e537947504b351baa5f68458c0522d30679bf465c3bb2a3ef31b7e7e
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e537947504b351baa5f68458
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c0522d30679bf465c3bb2a3ef31b7e7e
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [229, 55, 148, 117]
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [192, 82, 45, 48]
2026-02-02T15:31:52.694469 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [192, 82, 45, 48, 103, 155, 244, 101, 195, 187, 42, 62, 243, 27, 126, 126]
2026-02-02T15:31:52.694469 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.696075 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.696075 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:52.696075 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.696075 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:52.696075 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.696075 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.696075 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:52.696075 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030bf8fe3819743d0be689eda7d7aaa527a779657b0d79b48718c3ef17bf29822bf95a1953536cdf6ec3a2c1d7327c9a4c9
2026-02-02T15:31:52.696075 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(e20e6096) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.696075 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(e20e6096) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: bf8fe3819743d0be689eda7d7aaa527a779657b0d79b48718c3ef17bf29822bf95a1953536cdf6ec3a2c1d7327c9a4c9
2026-02-02T15:31:52.697091 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:52.697091 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.697091 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:52.697091 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:52.697091 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:52.697091 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:52.697091 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:52.697091 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0296e15a) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:52.697091 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0296e15a) END (from buffer). Returning 48 bytes: bf8fe3819743d0be689eda7d7aaa527a779657b0d79b48718c3ef17bf29822bf95a1953536cdf6ec3a2c1d7327c9a4c9. Buffer after: 0 bytes: 
2026-02-02T15:31:52.697091 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [191, 143, 227, 129]
2026-02-02T15:31:52.697595 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:52.697595 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: bf8fe3819743d0be689eda7d7aaa527a779657b0d79b48718c3ef17bf29822bf95a1953536cdf6ec3a2c1d7327c9a4c9
2026-02-02T15:31:52.697595 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: bf8fe3819743d0be689eda7d7aaa527a779657b0d79b48718c3ef17bf29822bf
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 95a1953536cdf6ec3a2c1d7327c9a4c9
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [191, 143, 227, 129]
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [149, 161, 149, 53]
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [149, 161, 149, 53, 54, 205, 246, 236, 58, 44, 29, 115, 39, 201, 164, 201]
2026-02-02T15:31:52.697975 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.697975 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 32 bytes
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:52.697975 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:52.697975 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.697975 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.697975 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:52.698978 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.698978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.698978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.698978 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:52.698978 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:52.698978 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.698978 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:52.698978 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.698978 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:52.698978 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:52.698978 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:52.698978 [FINE] [YamuxStream] [7][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:52.698978 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:52.698978 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:52.699979 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:52.699979 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:52.699979 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 46 bytes: 002c41c0b0846cbfef9b370c3951c3c28d263b89cb4c2f2c26a3f41cc8ed5e8da3ec7abc8f704c76f0ff2992d237
2026-02-02T15:31:52.699979 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 50 bytes successfully. Data preview (hex): 0030bf8fe3819743d0be689eda7d7aaa527a7796...
2026-02-02T15:31:52.699979 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 7ms
2026-02-02T15:31:52.699979 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:52.699979 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.699979 [FINEST] [YamuxStream] [6][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.700978 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.700978 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.700978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.700978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.700978 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.700978 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.700978 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.700978 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.700978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.700978 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(9de26861) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.700978 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(9de26861) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.701481 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.701481 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.701481 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.701481 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.701481 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.701481 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.701481 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.701481 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.701481 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.701481 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(20d7943a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.701481 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(20d7943a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.701481 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c41c0b0846cbfef9b370c3951c3c28d263b89cb4c2f2c26a3f41cc8ed5e8da3ec7abc8f704c76f0ff2992d237
2026-02-02T15:31:52.701481 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(9de26861) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.701481 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(9de26861) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 41c0b0846cbfef9b370c3951c3c28d263b89cb4c2f2c26a3f41cc8ed5e8da3ec7abc8f704c76f0ff2992d237
2026-02-02T15:31:52.701984 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:52.701984 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.701984 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:52.701984 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:52.701984 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:52.701984 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:52.701984 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:52.701984 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(13c641c5) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:52.701984 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(13c641c5) END (from buffer). Returning 44 bytes: 41c0b0846cbfef9b370c3951c3c28d263b89cb4c2f2c26a3f41cc8ed5e8da3ec7abc8f704c76f0ff2992d237. Buffer after: 0 bytes: 
2026-02-02T15:31:52.701984 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [65, 192, 176, 132]
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 41c0b0846cbfef9b370c3951c3c28d263b89cb4c2f2c26a3f41cc8ed5e8da3ec7abc8f704c76f0ff2992d237
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 41c0b0846cbfef9b370c3951c3c28d263b89cb4c2f2c26a3f41cc8ed
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5e8da3ec7abc8f704c76f0ff2992d237
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [65, 192, 176, 132]
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [94, 141, 163, 236]
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [94, 141, 163, 236, 122, 188, 143, 112, 76, 118, 240, 255, 41, 146, 210, 55]
2026-02-02T15:31:52.702494 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.702494 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 28 bytes
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:52.702494 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:52.704009 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.704009 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.704009 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:52.704009 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.704009 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.704009 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.704009 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:52.704009 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:52.705028 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.705028 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:52.705028 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.705028 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:52.705028 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:52.705028 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:52.705028 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:52.705532 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:52.705532 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:52.705532 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:52.705532 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:52.705532 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:52.705532 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:52.705532 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:52.705532 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 46 bytes: 002c93961b5174cfea2f7223b04130e77d8196cb975111a67e66b04cdee144a8ed70304c4fcb65377b1c2ffc757a
2026-02-02T15:31:52.705532 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 46 bytes successfully. Data preview (hex): 002c93961b5174cfea2f7223b04130e77d8196cb...
2026-02-02T15:31:52.705532 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:31:52.705532 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:52.705532 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:52.705532 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:52.705532 [FINE] [StreamScopeImpl] stream-1770067912656-7672: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.705532 [FINE] [StreamScopeImpl] stream-1770067912656-7672: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:52.705532 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:52.707050 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc (reported as 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc) on stream 1
2026-02-02T15:31:52.707050 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false. Stream ID: 1
2026-02-02T15:31:52.707050 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false. Stream ID: 1
2026-02-02T15:31:52.707050 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.707050 [FINE] [StreamScopeImpl] stream-1770067912656-7672: Setting service to libp2p.identify for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc, protocol /ipfs/id/1.0.0
2026-02-02T15:31:52.707050 [FINE] [StreamScopeImpl] stream-1770067912656-7672: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:52.707050 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.707050 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc: seq=3, protocols=6, addrs=2
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Snapshot seq: 3
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58549 for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4102, RemoteAddr: /ip4/127.0.0.1/tcp/58549, ViaLoopback: true for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:52.707587 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.708598 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58549)
2026-02-02T15:31:52.708598 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Total message size: 414 bytes. SignedPeerRecord present: true
2026-02-02T15:31:52.708598 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 414).
2026-02-02T15:31:52.708598 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 416 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:52.708598 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 428, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160, 158, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:31:52.708598 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:52.708598 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 444 bytes (plaintext was 428)
2026-02-02T15:31:52.708598 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 446
2026-02-02T15:31:52.708598 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 446 bytes: 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
2026-02-02T15:31:52.708598 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 46 bytes successfully. Data preview (hex): 002c41c0b0846cbfef9b370c3951c3c28d263b89...
2026-02-02T15:31:52.708598 [FINE] [YamuxStream] [7][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 9ms
2026-02-02T15:31:52.708598 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.708598 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.708598 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.708598 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.709899 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.709899 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.709899 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.709899 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.709899 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.709899 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.709899 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(66751794) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.709899 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(66751794) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.709899 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c93961b5174cfea2f7223b04130e77d8196cb975111a67e66b04cdee144a8ed70304c4fcb65377b1c2ffc757a
2026-02-02T15:31:52.709899 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(20d7943a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.709899 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(20d7943a) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 93961b5174cfea2f7223b04130e77d8196cb975111a67e66b04cdee144a8ed70304c4fcb65377b1c2ffc757a
2026-02-02T15:31:52.709899 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:52.709899 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.709899 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:52.709899 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:52.710897 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:52.710897 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0408811b) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:52.710897 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(0408811b) END (from buffer). Returning 44 bytes: 93961b5174cfea2f7223b04130e77d8196cb975111a67e66b04cdee144a8ed70304c4fcb65377b1c2ffc757a. Buffer after: 0 bytes: 
2026-02-02T15:31:52.710897 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [147, 150, 27, 81]
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 93961b5174cfea2f7223b04130e77d8196cb975111a67e66b04cdee144a8ed70304c4fcb65377b1c2ffc757a
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 93961b5174cfea2f7223b04130e77d8196cb975111a67e66b04cdee1
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 44a8ed70304c4fcb65377b1c2ffc757a
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [147, 150, 27, 81]
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [68, 168, 237, 112]
2026-02-02T15:31:52.710897 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [68, 168, 237, 112, 48, 76, 79, 203, 101, 55, 123, 28, 47, 252, 117, 122]
2026-02-02T15:31:52.710897 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.711897 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 28 bytes
2026-02-02T15:31:52.711897 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:52.711897 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:52.711897 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:52.711897 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:52.711897 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.711897 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:52.711897 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:52.713401 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:52.713401 [FINE] [YamuxStream] [7][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:22.713401
2026-02-02T15:31:52.713401 [FINE] [StreamScopeImpl] stream-1770067912660-7693: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN
2026-02-02T15:31:52.713401 [FINE] [StreamScopeImpl] stream-1770067912660-7693: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:52.713401 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:52.713401 [FINE] [StreamScopeImpl] stream-1770067912660-7693: Setting service to libp2p.identify for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, protocol /ipfs/id/1.0.0
2026-02-02T15:31:52.713401 [FINE] [StreamScopeImpl] stream-1770067912660-7693: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:52.713401 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.713401 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 446 bytes successfully. Data preview (hex): 01bcdce30b606f81231d48b0cf0041c890111345...
2026-02-02T15:31:52.713401 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 416 bytes in 4ms
2026-02-02T15:31:52.713401 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.713401 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.713401 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.714419 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc to 3.
2026-02-02T15:31:52.714419 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.714419 [FINER] [YamuxStream] [6][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:52.714419 [FINER] [YamuxStream] [6][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:52.714419 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.714419 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:52.714419 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.714419 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.714419 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 30 bytes: 001ccf746299943ee202467ea9f45509deac5c7c50a26e34e7349eaadd4c
2026-02-02T15:31:52.715470 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 30 bytes successfully. Data preview (hex): 001ccf746299943ee202467ea9f45509deac5c7c...
2026-02-02T15:31:52.715470 [FINE] [YamuxStream] [6][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:52.715470 [FINE] [YamuxStream] [6][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:52.715470 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:52.715470 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc. IsPush: false.
2026-02-02T15:31:52.715470 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (446 bytes): 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
2026-02-02T15:31:52.715470 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.715470 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.715470 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.715470 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.715470 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.715470 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.715470 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.715470 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.716495 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.716495 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(acae502b) START. Requested: 2. Buffer: 446 bytes.
2026-02-02T15:31:52.716495 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(acae502b) END (from buffer). Returning 2 bytes: 01bc. Buffer after: 444 bytes: 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
2026-02-02T15:31:52.716495 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 188]
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 188]
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01bc
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 444
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 444
2026-02-02T15:31:52.716495 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 444 more bytes (have 0/444)
2026-02-02T15:31:52.716495 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(b2c071c2) START. Requested: 444. Buffer: 444 bytes.
2026-02-02T15:31:52.716495 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(b2c071c2) END (from buffer). Returning 444 bytes: dce30b606f81231d48b0cf0041c890111345c5655193f84d62dd7e3fb7bbb3c4d12974b720e56379687c036a52f78bed661c0bf270d75da225cb5670ed2f67f7a1d07a5c38caf9b768b332e476ac50da4616876a3e0415b16200631209d726248032efe75ec5c561b0bb7acf655ccd3860d39ce07499df334f097dd1b2c8b72e08ddba7bda0b16f1ea78eeed783cb090064a7c114c20cd8b7c9c6f27beb78fd628090bdd1f5d1ee16dd520b2a2ecb4c057e88158d4e5f244dc4e319540c7eeb9d027b84f265c821673463a473f8c6fd6436d4084fac0da70c0f272018b8c5dba0afcc9b4c8406412f0a3c7478145fcb380d2bf25a3f0716c20540c4d8a99b0f7b14108f705f2a627c73a83c6c87b4ca7813da70fb34e10fab75eec7f027016a0ad3df2ca60216ae54fefad875be2be82b10fab5e11ad22f3d10313f3e4341bb14273c988b988f25112d9c963a17970944f0b826d826cb5f95b3302d61001712cf5c65528c2f69d502726dace7efbbc641649f8c3bf647492e50b3b46ddbef83644f1fdab435437a811dedbc6835b1bc0877a2d135cac068c81aedded8788ddb8660f6971d8dc1ce5b07b8645b8993285ccc794bc386fa9bcafa9f9d0. Buffer after: 0 bytes: 
2026-02-02T15:31:52.716495 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 444 bytes. First 4 bytes: [220, 227, 11, 96]
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 444, Got: 444
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 444, Bytes: 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
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 444
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(428) and MAC(16)
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: dce30b606f81231d48b0cf0041c890111345c5655193f84d62dd7e3fb7bbb3c4d12974b720e56379687c036a52f78bed661c0bf270d75da225cb5670ed2f67f7a1d07a5c38caf9b768b332e476ac50da4616876a3e0415b16200631209d726248032efe75ec5c561b0bb7acf655ccd3860d39ce07499df334f097dd1b2c8b72e08ddba7bda0b16f1ea78eeed783cb090064a7c114c20cd8b7c9c6f27beb78fd628090bdd1f5d1ee16dd520b2a2ecb4c057e88158d4e5f244dc4e319540c7eeb9d027b84f265c821673463a473f8c6fd6436d4084fac0da70c0f272018b8c5dba0afcc9b4c8406412f0a3c7478145fcb380d2bf25a3f0716c20540c4d8a99b0f7b14108f705f2a627c73a83c6c87b4ca7813da70fb34e10fab75eec7f027016a0ad3df2ca60216ae54fefad875be2be82b10fab5e11ad22f3d10313f3e4341bb14273c988b988f25112d9c963a17970944f0b826d826cb5f95b3302d61001712cf5c65528c2f69d502726dace7efbbc641649f8c3bf647492e50b3b46ddbef83644f1fdab435437a811dedbc6835b1bc0877a2d135cac068c81aedded8788ddb8660f6971d8dc1ce5b07b8645
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: b8993285ccc794bc386fa9bcafa9f9d0
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [220, 227, 11, 96]
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [184, 153, 50, 133]
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [184, 153, 50, 133, 204, 199, 148, 188, 56, 111, 169, 188, 175, 169, 249, 208]
2026-02-02T15:31:52.716495 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.716495 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.717494 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 428 bytes
2026-02-02T15:31:52.717494 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 428 bytes to _decryptedBuffer. New _decryptedBuffer.length: 428
2026-02-02T15:31:52.717494 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 416. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160]
2026-02-02T15:31:52.717494 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.717494 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.717494 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=416
2026-02-02T15:31:52.717494 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.717494 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.718001 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.718001 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=416
2026-02-02T15:31:52.718001 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 416, _decryptedBuffer.length: 416
2026-02-02T15:31:52.718001 [FINER] [SecuredConnection] SecuredConnection.read (length=416): Returning 416 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [158, 3, 10, 36, 8, 1, 18, 32, 10, 164, 141, 210, 6, 184, 66, 185, 2, 158, 10, 114]
2026-02-02T15:31:52.718001 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=416
2026-02-02T15:31:52.718001 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.718001 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 416, flags: 0
2026-02-02T15:31:52.718001 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 416 bytes directly to waiting reader
2026-02-02T15:31:52.718001 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 452
2026-02-02T15:31:52.718001 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, 414 bytes, duration=4ms
2026-02-02T15:31:52.718001 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. IsPush: false.
2026-02-02T15:31:52.718001 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 6
2026-02-02T15:31:52.718001 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 6
2026-02-02T15:31:52.718001 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 6, After: 6
2026-02-02T15:31:52.718001 [FINER] [identify] IdentifyService._diff: Added: 0, Removed: 0
2026-02-02T15:31:52.718001 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN - Added protocols: 0, Removed protocols: 0
2026-02-02T15:31:52.719009 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: /ip4/127.0.0.1/tcp/58549
2026-02-02T15:31:52.719009 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58549 for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN via conn 2.
2026-02-02T15:31:52.719009 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.719009 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.719009 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN (181 bytes).
2026-02-02T15:31:52.719009 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:52.719009 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:52.725351 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:52.725351 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: true
2026-02-02T15:31:52.725351 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:52.725351 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:52.725351 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:52.725351 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.725351 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.725351 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from record public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.725351 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.726365 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Found 2 addresses.
2026-02-02T15:31:52.726365 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN based on remote connection address /ip4/127.0.0.1/tcp/4102. Before filter: 2
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4102 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: 2
2026-02-02T15:31:52.726365 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.726365 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from local peer 12D3KooWJxfgcqEW471UAL811vAQA32j9McCVyfZ1UZqGCeeDaRc.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN from received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches expected remote peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.726365 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN. Comparing with received key.
2026-02-02T15:31:52.726365 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN matches existing key in peerstore.
2026-02-02T15:31:52.726365 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN.
2026-02-02T15:31:52.728112 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN in peerstore.
2026-02-02T15:31:52.728112 [FINE] [autonatv2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN identification completed, updating peer map
2026-02-02T15:31:52.728112 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports push.
2026-02-02T15:31:52.728112 [FINER] [YamuxStream] [7][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:52.728112 [FINER] [YamuxStream] [7][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:52.728630 [FINE] [autonatv2] Updating peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:31:52.728630 [FINE] [autonatv2] Adding peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:52.728630 [FINE] [ambient_autonat_v2] Peer 12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN supports AutoNAT v2, scheduling probe
2026-02-02T15:31:52.728630 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:52.728630 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:52.728630 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:52.729142 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.729142 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.729142 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 30 bytes: 001cc4ed649f0ee43ccf089b7afb8b9803b59f27e95b887c43fc4648b0e6
2026-02-02T15:31:52.729655 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ccf746299943ee202467ea9f45509deac5c7c50a26e34e7349eaadd4c
2026-02-02T15:31:52.729655 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.729655 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.729655 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.730166 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.730166 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.730166 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.730166 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.730166 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.730166 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.730166 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(518cc756) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:52.730166 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(518cc756) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: cf746299943ee202467ea9f45509deac5c7c50a26e34e7349eaadd4c
2026-02-02T15:31:52.730166 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.730838 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.730838 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(bc764cdc) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.730838 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(bc764cdc) END (from buffer). Returning 28 bytes: cf746299943ee202467ea9f45509deac5c7c50a26e34e7349eaadd4c. Buffer after: 0 bytes: 
2026-02-02T15:31:52.730838 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [207, 116, 98, 153]
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: cf746299943ee202467ea9f45509deac5c7c50a26e34e7349eaadd4c
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: cf746299943ee202467ea9f4
2026-02-02T15:31:52.730838 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5509deac5c7c50a26e34e7349eaadd4c
2026-02-02T15:31:52.731846 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [207, 116, 98, 153]
2026-02-02T15:31:52.731846 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [85, 9, 222, 172]
2026-02-02T15:31:52.734856 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [85, 9, 222, 172, 92, 124, 80, 162, 110, 52, 231, 52, 158, 170, 221, 76]
2026-02-02T15:31:52.735867 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.736868 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.737781 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:31:52.737781 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.738285 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.738285 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.738285 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.738285 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:52.738285 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:52.738285 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:31:52.738285 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc4ed649f0ee43ccf089b7afb8b9803b59f27e95b887c43fc4648b0e6
2026-02-02T15:31:52.738285 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(66751794) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.738285 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(66751794) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c4ed649f0ee43ccf089b7afb8b9803b59f27e95b887c43fc4648b0e6
2026-02-02T15:31:52.738285 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:52.738285 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.738285 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:52.738285 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:52.738285 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:52.739776 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:52.739776 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:52.739776 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(0230c28c) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:52.739776 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(0230c28c) END (from buffer). Returning 28 bytes: c4ed649f0ee43ccf089b7afb8b9803b59f27e95b887c43fc4648b0e6. Buffer after: 0 bytes: 
2026-02-02T15:31:52.739776 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [196, 237, 100, 159]
2026-02-02T15:31:52.739776 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:52.739776 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c4ed649f0ee43ccf089b7afb8b9803b59f27e95b887c43fc4648b0e6
2026-02-02T15:31:52.740280 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:52.740280 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:52.740280 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c4ed649f0ee43ccf089b7afb
2026-02-02T15:31:52.740280 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8b9803b59f27e95b887c43fc4648b0e6
2026-02-02T15:31:52.740280 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [196, 237, 100, 159]
2026-02-02T15:31:52.740280 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [139, 152, 3, 181]
2026-02-02T15:31:52.740280 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [139, 152, 3, 181, 159, 39, 233, 91, 136, 124, 67, 252, 70, 72, 176, 230]
2026-02-02T15:31:52.740280 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.740798 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.740798 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:52.740798 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:52.740798 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:52.740798 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.740798 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.740798 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:52.740798 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:52.740798 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:52.740798 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 30 bytes successfully. Data preview (hex): 001cc4ed649f0ee43ccf089b7afb8b9803b59f27...
2026-02-02T15:31:52.740798 [FINE] [YamuxStream] [7][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.closing.
2026-02-02T15:31:52.740798 [FINE] [YamuxStream] [7][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.closing.
2026-02-02T15:31:52.740798 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWAXun61SvbbpBkPEozU8zDA1Yqzjba4cAYMZELY9dSFBN, duration=96ms
2026-02-02T15:31:52.740798 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:31:52.740798 [FINE] [YamuxStream] [7][Client] StreamID=3 setDeadline() set to 2026-02-02T15:32:02.740798
2026-02-02T15:31:52.741801 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/test/1.0.0] on stream 3...
2026-02-02T15:31:52.741801 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:52.741801 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:52.741801 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:52.742306 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:52.742306 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:52.742306 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 50 bytes: 003097a1b4a4e00808ae8a65f9fdb4b4d41f04303054b3030f6cd428f93bda71cfcc35aa3391c76cc8bc3727d659766b5ec7
2026-02-02T15:31:52.743396 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.743396 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.743396 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.743396 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.743396 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.743396 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.743396 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.743396 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.743396 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.743396 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(809d5340) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.743396 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(809d5340) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.743396 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.744399 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(f16286e3) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.744399 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(f16286e3) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.744399 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 003097a1b4a4e00808ae8a65f9fdb4b4d41f04303054b3030f6cd428f93bda71cfcc35aa3391c76cc8bc3727d659766b5ec7
2026-02-02T15:31:52.744399 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(f16286e3) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.744399 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(f16286e3) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 97a1b4a4e00808ae8a65f9fdb4b4d41f04303054b3030f6cd428f93bda71cfcc35aa3391c76cc8bc3727d659766b5ec7
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:52.744399 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(904dd5c6) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:52.744399 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(904dd5c6) END (from buffer). Returning 48 bytes: 97a1b4a4e00808ae8a65f9fdb4b4d41f04303054b3030f6cd428f93bda71cfcc35aa3391c76cc8bc3727d659766b5ec7. Buffer after: 0 bytes: 
2026-02-02T15:31:52.744399 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [151, 161, 180, 164]
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 97a1b4a4e00808ae8a65f9fdb4b4d41f04303054b3030f6cd428f93bda71cfcc35aa3391c76cc8bc3727d659766b5ec7
2026-02-02T15:31:52.744399 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:52.745410 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:52.745410 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 97a1b4a4e00808ae8a65f9fdb4b4d41f04303054b3030f6cd428f93bda71cfcc
2026-02-02T15:31:52.745410 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 35aa3391c76cc8bc3727d659766b5ec7
2026-02-02T15:31:52.745410 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [151, 161, 180, 164]
2026-02-02T15:31:52.745410 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [53, 170, 51, 145]
2026-02-02T15:31:52.745410 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [53, 170, 51, 145, 199, 108, 200, 188, 55, 39, 214, 89, 118, 107, 94, 199]
2026-02-02T15:31:52.745410 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.745917 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.745917 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:31:52.745917 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:52.745917 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:52.745917 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.745917 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.745917 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:52.746428 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.746428 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.746428 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.746428 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:52.746428 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:52.746428 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.746428 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:52.746428 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.746428 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:52.746428 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:52.746428 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:52.746428 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.746428 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:52.746428 [FINE] [YamuxStream] [6][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:52.746428 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:52.746428 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:52.746428 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:52.746428 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:52.746428 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 50 bytes: 00300d702d4d37e5ab78c7f6382fdab46cfdaaf56bbeab56d43fac06f0d3ff177889d4d4086ace86fa58a2b755da94082d7e
2026-02-02T15:31:52.747945 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 50 bytes successfully. Data preview (hex): 003097a1b4a4e00808ae8a65f9fdb4b4d41f0430...
2026-02-02T15:31:52.747945 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 6ms
2026-02-02T15:31:52.747945 [FINEST] [YamuxStream] [7][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.747945 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.747945 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.747945 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.747945 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.747945 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.747945 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.747945 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.747945 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.747945 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.747945 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(23481cca) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.747945 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(23481cca) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.749103 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00300d702d4d37e5ab78c7f6382fdab46cfdaaf56bbeab56d43fac06f0d3ff177889d4d4086ace86fa58a2b755da94082d7e
2026-02-02T15:31:52.749103 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(809d5340) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.749103 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(809d5340) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 0d702d4d37e5ab78c7f6382fdab46cfdaaf56bbeab56d43fac06f0d3ff177889d4d4086ace86fa58a2b755da94082d7e
2026-02-02T15:31:52.749103 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:52.749103 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:52.749103 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3eeceaa9) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:52.749103 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(3eeceaa9) END (from buffer). Returning 48 bytes: 0d702d4d37e5ab78c7f6382fdab46cfdaaf56bbeab56d43fac06f0d3ff177889d4d4086ace86fa58a2b755da94082d7e. Buffer after: 0 bytes: 
2026-02-02T15:31:52.749103 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [13, 112, 45, 77]
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 0d702d4d37e5ab78c7f6382fdab46cfdaaf56bbeab56d43fac06f0d3ff177889d4d4086ace86fa58a2b755da94082d7e
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 0d702d4d37e5ab78c7f6382fdab46cfdaaf56bbeab56d43fac06f0d3ff177889
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: d4d4086ace86fa58a2b755da94082d7e
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [13, 112, 45, 77]
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [212, 212, 8, 106]
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [212, 212, 8, 106, 206, 134, 250, 88, 162, 183, 85, 218, 148, 8, 45, 126]
2026-02-02T15:31:52.749103 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.749103 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.750607 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:31:52.750607 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:52.750607 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:52.752115 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.753118 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.753118 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:52.753118 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.753118 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.753118 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.753118 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:52.754120 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:52.754120 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.754120 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:52.754120 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.754120 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:52.754120 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:52.754120 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:52.754120 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 13 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:52.754120 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 25, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13, 12, 47, 116, 101, 115, 116, 47, 49])
2026-02-02T15:31:52.755118 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:52.755118 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 41 bytes (plaintext was 25)
2026-02-02T15:31:52.755118 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 43
2026-02-02T15:31:52.755118 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 43 bytes: 0029ee02008991c3c05b489b4eea69af5e9b3ceb61e113ddec985bcd5e60e1822bbfea4d5cc97cdfa2e1d5
2026-02-02T15:31:52.755118 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 43 bytes successfully. Data preview (hex): 0029ee02008991c3c05b489b4eea69af5e9b3ceb...
2026-02-02T15:31:52.755118 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 13 bytes in 0ms
2026-02-02T15:31:52.755118 [FINEST] [YamuxStream] [7][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.756118 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 50 bytes successfully. Data preview (hex): 00300d702d4d37e5ab78c7f6382fdab46cfdaaf5...
2026-02-02T15:31:52.756118 [FINE] [YamuxStream] [6][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 9ms
2026-02-02T15:31:52.756118 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:52.756118 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.756118 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.757118 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.757118 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.757118 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.757872 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.757872 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.757872 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.757872 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.757872 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.757872 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.757872 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(48acc3a2) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.757872 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(48acc3a2) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.757872 [FINEST] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - RAW_SOCKET_DATA_CHUNK_RECV (43 bytes): 0029ee02008991c3c05b489b4eea69af5e9b3ceb61e113ddec985bcd5e60e1822bbfea4d5cc97cdfa2e1d5
2026-02-02T15:31:52.757872 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(23481cca) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.757872 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(23481cca) END (from buffer). Returning 2 bytes: 0029. Buffer after: 41 bytes: ee02008991c3c05b489b4eea69af5e9b3ceb61e113ddec985bcd5e60e1822bbfea4d5cc97cdfa2e1d5
2026-02-02T15:31:52.757872 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 41]
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 41]
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0029
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 41
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 41
2026-02-02T15:31:52.758988 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 41 more bytes (have 0/41)
2026-02-02T15:31:52.758988 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(40cbb7d1) START. Requested: 41. Buffer: 41 bytes.
2026-02-02T15:31:52.758988 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(40cbb7d1) END (from buffer). Returning 41 bytes: ee02008991c3c05b489b4eea69af5e9b3ceb61e113ddec985bcd5e60e1822bbfea4d5cc97cdfa2e1d5. Buffer after: 0 bytes: 
2026-02-02T15:31:52.758988 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 41 bytes. First 4 bytes: [238, 2, 0, 137]
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 41, Got: 41
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 41, Bytes: ee02008991c3c05b489b4eea69af5e9b3ceb61e113ddec985bcd5e60e1822bbfea4d5cc97cdfa2e1d5
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 41
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(25) and MAC(16)
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ee02008991c3c05b489b4eea69af5e9b3ceb61e113ddec985b
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: cd5e60e1822bbfea4d5cc97cdfa2e1d5
2026-02-02T15:31:52.758988 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [238, 2, 0, 137]
2026-02-02T15:31:52.759991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [205, 94, 96, 225]
2026-02-02T15:31:52.759991 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [205, 94, 96, 225, 130, 43, 191, 234, 77, 92, 201, 124, 223, 162, 225, 213]
2026-02-02T15:31:52.760991 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.760991 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059679356): [92, 221, 56, 183, 216, 153, 27, 45, 155, 207, 64, 154, 172, 15, 61, 90, 15, 106, 33, 110, 192, 55, 46, 227, 192, 99, 185, 170, 118, 235, 192, 38]
2026-02-02T15:31:52.760991 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 25 bytes
2026-02-02T15:31:52.760991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 25 bytes to _decryptedBuffer. New _decryptedBuffer.length: 25
2026-02-02T15:31:52.760991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 13. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13]
2026-02-02T15:31:52.760991 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.760991 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.760991 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=13
2026-02-02T15:31:52.762017 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.762017 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.762017 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.762017 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=13
2026-02-02T15:31:52.762017 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 13, _decryptedBuffer.length: 13
2026-02-02T15:31:52.762017 [FINER] [SecuredConnection] SecuredConnection.read (length=13): Returning 13 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [12, 47, 116, 101, 115, 116, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:52.762017 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=13
2026-02-02T15:31:52.762017 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.762017 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 13, flags: 0
2026-02-02T15:31:52.762017 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 13 bytes directly to waiting reader
2026-02-02T15:31:52.762017 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 33
2026-02-02T15:31:52.762017 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/test/1.0.0"
2026-02-02T15:31:52.763022 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/test/1.0.0"
2026-02-02T15:31:52.763022 [WARNING] [multistream] [multistreamMuxer - negotiate] No handler for "/test/1.0.0". Sending "na".
2026-02-02T15:31:52.763022 [FINE] [YamuxStream] [6][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 4 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:52.763022 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 16, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 4, 3, 110, 97, 10])
2026-02-02T15:31:52.763022 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:52.763022 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 32 bytes (plaintext was 16)
2026-02-02T15:31:52.763022 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 34
2026-02-02T15:31:52.763022 [FINER] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Writing 34 bytes: 00202c8d756a1f3fe66636f39df892b63ba27dbf2051fdedf79305be6e1e9548ebc3
2026-02-02T15:31:52.763022 [FINEST] [TCPConnection] TCPConnection.write (id: 83d60187-1ad9-4e58-9dad-523b0a77eb4f): Flushed 34 bytes successfully. Data preview (hex): 00202c8d756a1f3fe66636f39df892b63ba27dbf...
2026-02-02T15:31:52.763022 [FINE] [YamuxStream] [6][Server] StreamID=3 Direct write: Successfully wrote all 4 bytes in 0ms
2026-02-02T15:31:52.763022 [FINE] [multistream] [multistreamMuxer - negotiate] Sent "na" for "/test/1.0.0". Continuing loop.
2026-02-02T15:31:52.763022 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:52.763022 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:52.763022 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.763022 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.763022 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.763022 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.763022 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.763022 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:52.763022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:52.763022 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:52.763022 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:52.764612 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(62c791b7) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:52.764612 [FINER] [TCPConnection] TCPConnection(83d60187-1ad9-4e58-9dad-523b0a77eb4f) - Read(62c791b7) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:52.764612 [FINEST] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 00202c8d756a1f3fe66636f39df892b63ba27dbf2051fdedf79305be6e1e9548ebc3
2026-02-02T15:31:52.764612 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(48acc3a2) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:52.764612 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(48acc3a2) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 2c8d756a1f3fe66636f39df892b63ba27dbf2051fdedf79305be6e1e9548ebc3
2026-02-02T15:31:52.764612 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 32]
2026-02-02T15:31:52.764612 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:52.764612 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 32]
2026-02-02T15:31:52.764612 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0020
2026-02-02T15:31:52.764612 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 32
2026-02-02T15:31:52.764612 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 32
2026-02-02T15:31:52.764612 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 32 more bytes (have 0/32)
2026-02-02T15:31:52.764612 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(64c950fd) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:52.764612 [FINER] [TCPConnection] TCPConnection(d02980d3-9bcc-407b-96c5-978da6baee2f) - Read(64c950fd) END (from buffer). Returning 32 bytes: 2c8d756a1f3fe66636f39df892b63ba27dbf2051fdedf79305be6e1e9548ebc3. Buffer after: 0 bytes: 
2026-02-02T15:31:52.765624 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 32 bytes. First 4 bytes: [44, 141, 117, 106]
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 32, Got: 32
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 32, Bytes: 2c8d756a1f3fe66636f39df892b63ba27dbf2051fdedf79305be6e1e9548ebc3
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 32
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(16) and MAC(16)
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2c8d756a1f3fe66636f39df892b63ba2
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7dbf2051fdedf79305be6e1e9548ebc3
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [44, 141, 117, 106]
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [125, 191, 32, 81]
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [125, 191, 32, 81, 253, 237, 247, 147, 5, 190, 110, 30, 149, 72, 235, 195]
2026-02-02T15:31:52.765624 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:52.765624 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057885709): [162, 141, 114, 81, 210, 245, 112, 251, 35, 61, 132, 215, 200, 21, 107, 36, 161, 97, 217, 133, 223, 89, 89, 207, 93, 206, 155, 194, 19, 228, 138, 25]
2026-02-02T15:31:52.765624 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 16 bytes
2026-02-02T15:31:52.766623 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 16 bytes to _decryptedBuffer. New _decryptedBuffer.length: 16
2026-02-02T15:31:52.766623 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 4. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 4]
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=4
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=4
2026-02-02T15:31:52.766623 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 4, _decryptedBuffer.length: 4
2026-02-02T15:31:52.766623 [FINER] [SecuredConnection] SecuredConnection.read (length=4): Returning 4 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [3, 110, 97, 10]
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=4
2026-02-02T15:31:52.766623 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:52.766623 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 4, flags: 0
2026-02-02T15:31:52.766623 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 4 bytes directly to waiting reader
2026-02-02T15:31:52.766623 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 24
2026-02-02T15:31:52.767626 [FINE] [SwarmStream] Resetting stream 3
2026-02-02T15:31:52.768133 [FINE] [YamuxStream] [7][Client] StreamID=3 reset() called. Current state: YamuxStreamState.open
2026-02-02T15:31:52.768133 [FINER] [YamuxStream] [7][Client] StreamID=3 Sending RESET frame.
2026-02-02T15:31:52.768133 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 8, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:52.768133 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:52.769142 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:52.769142 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:52.769142 [FINER] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Writing 30 bytes: 001cf467e4fb3bb29baa5a6a9cea6da621d38ae34fcfefdff4cd9eaa0c7e
2026-02-02T15:31:52.769142 [FINEST] [TCPConnection] TCPConnection.write (id: d02980d3-9bcc-407b-96c5-978da6baee2f): Flushed 30 bytes successfully. Data preview (hex): 001cf467e4fb3bb29baa5a6a9cea6da621d38ae3...
2026-02-02T15:31:52.769142 [FINER] [YamuxStream] [7][Client] StreamID=3 Cleaning up after reset (was YamuxStreamState.open).
2026-02-02T15:31:52.778581 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:52.781580 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:52.781580 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:52.781580 [FINE] [YamuxStream] [7][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:52.781580 [FINE] [SwarmStream] Stream 3: Cleaning up management scope during reset
2026-02-02T15:31:52.782321 [FINE] [SwarmStream] Stream 3 reset and removed from connection
2026-02-02T15:31:52.782321 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: null on stream 3
2026-02-02T15:31:52.782321 [FINE] [YamuxStream] [7][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:31:52.782321 [SEVERE] [basichost] 🤝 [NEWSTREAM-PHASE-4] No protocol selected from: [/test/1.0.0]
2026-02-02T15:31:52.782321 [SEVERE] [basichost] ❌ [NEWSTREAM-ERROR] Stream creation failed after 466ms (negotiation: 41ms): Exception: Failed to negotiate any of the requested protocols: [/test/1.0.0] with peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
#0      BasicHost.newStream (package:dart_libp2p/p2p/host/basic/basic_host.dart:1318:9)
<asynchronous suspension>
#1      Libp2pRouter.sendMessage (package:dart_ipfs/src/transport/libp2p_router.dart:291:22)
<asynchronous suspension>
#2      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:87:7)
<asynchronous suspension>
#3      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#4      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#5      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:52.782321 [SEVERE] [Libp2pRouter] [ERROR] Failed to send message to 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
Error: Exception: Failed to negotiate protocol with 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz for [/test/1.0.0]: Exception: Failed to negotiate any of the requested protocols: [/test/1.0.0] with peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
Stack trace: null
01:00 +911 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:00 +911 -4: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should send and receive messages [E]
  Exception: Failed to negotiate protocol with 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz for [/test/1.0.0]: Exception: Failed to negotiate any of the requested protocols: [/test/1.0.0] with peer 12D3KooWLitE6ScwCmuqYV1yrDrNBTNmcZo8KZ99xGfrqfNP4pjz
  package:dart_libp2p/p2p/host/basic/basic_host.dart 1369:7  BasicHost.newStream
  ===== asynchronous gap ===========================
  package:dart_ipfs/src/transport/libp2p_router.dart 291:22  Libp2pRouter.sendMessage
  ===== asynchronous gap ===========================
  test\transport\libp2p_router_test.dart 87:7                main.<fn>.<fn>
  
01:00 +911 -4: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:31:52.829532 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:52.829532 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:52.829532 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:52.829532 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:52.830542 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:52.830542 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:52.830542 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:52.830542 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:52.830542 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:52.830542 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:52.831341 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:52.831341 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:52.832930 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:52.832930 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:52.832930 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:52.832930 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:52.832930 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:52.832930 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:52.832930 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:52.832930 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:52.832930 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:52.832930 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:52.833932 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:52.833932 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:52.833932 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:52.833932 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:52.833932 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:52.833932 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
01:00 +911 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:53.082165 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:31:53.082165 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58541 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:31:53.083312 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58541: ServerSocket closed.
2026-02-02T15:31:53.083312 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/58541 connectionStream is done. Removing listener.
2026-02-02T15:31:53.083312 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58541 already closed.
2026-02-02T15:31:53.083312 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58541: ConnectionController closed.
2026-02-02T15:31:53.083312 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWCkPB6c5rnC87P8BApXrowkWDDHxdUfF1oYctA8eYft13
2026-02-02T15:31:53.978964 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4601. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4601 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:53.978964 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4601 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4601
2026-02-02T15:31:53.979963 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4601. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4601] for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:53.979963 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.979963 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4601 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:53.979963 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:53.980613 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4601
2026-02-02T15:31:53.980613 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:53.980613 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.980613 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.980613 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.980613 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.980613 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.980613 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.980613 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:53.980613 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.980613 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.981629 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:53.981629 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:53.981629 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:31:53.981629 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:31:53.982627 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.982627 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:53.982627 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:53.982627 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:53.982627 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:53.982627 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:53.982627 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:31:53.993761 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:53.993761 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.993761 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 365133498, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.995960 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:53.995960 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, Host hashCode: 891096043
2026-02-02T15:31:53.995960 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.995960 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.997479 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:53.997479 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:53.997479 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:31:53.997479 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:31:53.997479 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.997479 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:53.997479 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:53.998497 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:53.998497 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:53.998497 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:53.998497 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:31:53.998497 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:53.999496 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:53.999496 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:53.999496 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, Host hashCode: 891096043
2026-02-02T15:31:53.999496 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.999496 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:53.999496 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:53.999496 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:53.999496 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:31:53.999496 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:31:53.999496 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.001002 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:54.001002 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:54.001002 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:54.001002 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:54.001002 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:54.001002 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:31:54.001002 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:54.002512 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:54.002512 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:54.002512 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:54.002512 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.002512 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 365133498, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.005544 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.005544 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 365133498, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.005544 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:54.005544 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:54.006549 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, Host hashCode: 891096043
2026-02-02T15:31:54.006549 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.006549 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.006549 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:54.007271 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:54.007271 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:31:54.007271 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:31:54.007271 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.007777 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:31:54.007777 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:54.007777 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:54.007777 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:54.007777 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:31:54.007777 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:31:54.007777 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601] for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:54.007777 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:54.008653 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.008653 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 365133498, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.008653 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:54.008653 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.008653 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 365133498, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:31:54.008653 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:54.008653 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:54.009658 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4601 with ID: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:54.009658 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:54.009658 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:54.010982 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:54.010982 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:54.010982 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:54.010982 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:54.010982 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:54.010982 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:54.010982 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:54.010982 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:54.010982 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:54.010982 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:54.010982 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:54.016440 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:54.016440 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.016440 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.017451 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 6ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.017451 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 7ms (dial: 6ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.017451 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:54.017451 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.017451 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:54.018452 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:54.018452 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:54.018452 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:54.018452 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:54.018452 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:54.018452 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:54.018452 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:54.018452 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.019874 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.019874 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.019874 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.021033 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:54.021033 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.021033 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:54.022538 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:54.023559 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:54.023559 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:54.023559 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:54.023559 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:54.023559 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:54.023559 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:54.023559 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.024747 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.024747 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.024747 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.025752 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:54.025752 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.025752 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:54.026270 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:54.026270 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:54.026270 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:54.026270 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:54.026270 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:54.026270 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:54.027884 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:54.027884 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.027884 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.028399 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.028399 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:145:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:54.028399 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:54.028399 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:54.028399 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:54.028399 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:54.032536 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:54.033041 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:54.033041 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:54.033041 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:54.034547 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:54.034547 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - Initial _network.listenAddresses: []
2026-02-02T15:31:54.036064 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, Host hashCode: 959332390
2026-02-02T15:31:54.036064 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:54.036064 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:54.036064 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:54.036582 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:54.036582 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:54.037596 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:54.539371 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:54.539371 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:54.539371 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:54.539371 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:54.539371 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:54.539371 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:54.539878 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:54.539878 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:54.539878 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:54.539878 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:54.539878 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:54.539878 [INFO] [Config] [Config.newNode] for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: Host created. Listening will be handled by host.start().
2026-02-02T15:31:54.539878 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:54.539878 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, network.hashCode: 1012994054, initial network.listenAddresses: []
2026-02-02T15:31:54.539878 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:54.539878 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4602]. Attempting to listen via _network.listen().
2026-02-02T15:31:54.539878 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:54.539878 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4602] for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:54.539878 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:54.539878 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4602 for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:54.539878 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4602 with transport TCPTransport for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:54.539878 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4602 with transport TCPTransport
01:02 +912 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +913 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +914 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +915 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +916 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +917 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +918 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +919 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +920 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +921 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:02 +921 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:55.194673 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4602. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4602 for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.194673 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4602 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4602
2026-02-02T15:31:55.194673 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4602. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4602] for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.194673 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.194673 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4602 for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:55.195178 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.195178 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4602
2026-02-02T15:31:55.195178 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.195178 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.195178 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.195178 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.195178 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.195178 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.195178 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.195178 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:55.196182 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.196182 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.196182 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.196182 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.196182 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:31:55.196182 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:31:55.196182 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.197182 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.197182 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.197182 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.197182 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.197182 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.197182 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:31:55.205700 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:55.206706 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.206706 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 1012994054, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.207705 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:55.207705 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, Host hashCode: 959332390
2026-02-02T15:31:55.207705 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.207705 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.207705 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.208704 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.208704 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:31:55.208704 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:31:55.208704 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.209210 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.209210 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.209210 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.209210 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.209210 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.209210 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:31:55.209210 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.209210 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:55.209210 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:55.210214 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, Host hashCode: 959332390
2026-02-02T15:31:55.210214 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.210214 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.210214 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.210214 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.210214 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:31:55.210214 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:31:55.233277 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.234278 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.235277 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.235277 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.235277 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.235277 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.235277 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:31:55.235277 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.236781 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:55.238801 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:55.240800 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:55.240800 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.241800 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 1012994054, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.241800 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.241800 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 1012994054, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.241800 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.241800 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:55.242800 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, Host hashCode: 959332390
2026-02-02T15:31:55.242800 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.243305 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.243305 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.243305 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.243305 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:31:55.243305 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:31:55.243305 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.244310 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.244310 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.244310 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.244310 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.244310 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.244310 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:31:55.244310 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.244310 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.244310 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.244310 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 1012994054, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.244310 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:55.244310 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.246085 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 1012994054, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.246085 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:55.246601 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:55.246601 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4602 with ID: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.246601 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:55.248110 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:55.249115 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:55.249115 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:55.249115 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:55.249115 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:55.250621 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:55.250621 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:55.250621 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:55.251139 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:55.251139 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:55.251676 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:55.251676 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:55.255179 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:55.255684 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.255684 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.256688 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 6ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.256688 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 7ms (dial: 7ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.256688 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:55.256688 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.256688 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:55.257694 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:55.257694 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:55.257694 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:55.257694 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:55.258199 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:55.258199 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:55.258199 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:55.258199 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.258199 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.259203 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.259203 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.259203 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:55.259203 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.259203 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:55.260202 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:55.260202 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:55.260202 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:55.260202 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:55.260202 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:55.260202 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:55.261203 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:55.261203 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.261709 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.261709 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.261709 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.261709 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:55.261709 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.261709 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:55.262712 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:55.262712 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:55.262712 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:55.262712 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:55.263713 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:55.263713 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:55.263713 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:55.264217 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.264217 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.264217 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.264217 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:146:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:55.264217 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:55.264217 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:55.265221 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/request/1.0.0
2026-02-02T15:31:55.265221 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4602/p2p/12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.265221 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:55.265221 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, Host hashCode: 959332390
2026-02-02T15:31:55.265221 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.265221 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.266221 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.266221 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.266221 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:31:55.266221 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:31:55.266221 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:31:55.266221 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:31:55.266221 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:55.266221 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.266221 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.266221 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:31:55.267220 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:31:55.267220 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.267220 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, existing_conns=0
2026-02-02T15:31:55.267220 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo"
2026-02-02T15:31:55.267220 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo"
2026-02-02T15:31:55.267220 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Dialing.
2026-02-02T15:31:55.268577 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:55.268577 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:31:55.268577 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:55.268577 [FINE] [Swarm] Dialing 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:55.268577 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:55.268577 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4602 (priority 1)
2026-02-02T15:31:55.268577 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo at /ip4/127.0.0.1/tcp/4602
2026-02-02T15:31:55.272619 [FINE] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4602, Socket Remote: 127.0.0.1:58550
2026-02-02T15:31:55.274089 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067915272-9031
2026-02-02T15:31:55.274089 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:55.274089 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9d642e26) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:55.274089 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9d642e26) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:55.279683 [FINE] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58550, Socket Remote: 127.0.0.1:4602
2026-02-02T15:31:55.280687 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067915279-2653
2026-02-02T15:31:55.280687 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWQhpifJPcRjWoeYBmzBy1hAuXCuWb3sgkDbcjKk65pdMt
2026-02-02T15:31:55.281191 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:55.281191 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:55.281191 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9d642e26) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.281191 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9d642e26) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:55.281191 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:55.281191 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:55.281191 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:55.281191 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:55.281191 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(e863b062) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:55.281191 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(e863b062) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:55.282735 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(e863b062) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(e863b062) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:55.282735 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:55.282735 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:55.282735 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(15def70e) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(15def70e) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:55.282735 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(15def70e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(15def70e) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:55.282735 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:55.282735 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:55.282735 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:55.282735 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:55.284230 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:55.284230 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:55.284230 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:55.284230 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:55.284230 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:55.286312 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(ee6e3216) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.286312 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(ee6e3216) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.286312 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:55.286312 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(59487791) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:55.286312 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(59487791) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:55.286312 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:55.286312 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(59487791) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.286312 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(59487791) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:55.289880 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:55.290388 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 34 bytes: 0020d6f6874b843dec388689bdfb1a62a2071185de3fbc5c5a2ff47ec8f65001c721
2026-02-02T15:31:55.290388 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 0020d6f6874b843dec388689bdfb1a62a2071185de3fbc5c5a2ff47ec8f65001c721
2026-02-02T15:31:55.290892 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(ee6e3216) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.290892 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(ee6e3216) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: d6f6874b843dec388689bdfb1a62a2071185de3fbc5c5a2ff47ec8f65001c721
2026-02-02T15:31:55.290892 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(85580327) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:55.290892 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(85580327) END (from buffer). Returning 32 bytes: d6f6874b843dec388689bdfb1a62a2071185de3fbc5c5a2ff47ec8f65001c721. Buffer after: 0 bytes: 
2026-02-02T15:31:55.290892 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:55.298958 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:55.300114 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 202 bytes: 00c86b59b960b7b7b63960e34afed33b73a3b287a80f29af5fba4da6049d90a7676d11fdd389b891a4190bda6857bcd807049b07a2c71fe6f18e37adede0fb129b6ba592ba383f9a2829cac45d7bdd9728ca61f265fe5e6de87d08afde0ab78225b040b7ca2f42c3bd6bc24a41ab514cdf99a1bfad5fcab25b60232bb6d47b5911447d89fde2945acbcfaa81217fca85d285248cb78faeac27e47047257afb9f9c0a6073a3e770ac357cec92e3d386f0a465f309e933cabba4129ce9263cf4ba5a126ff94de56fb3a550
2026-02-02T15:31:55.300114 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 202 bytes successfully. Data preview (hex): 00c86b59b960b7b7b63960e34afed33b73a3b287...
2026-02-02T15:31:55.300618 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(71353a69) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.300618 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(71353a69) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.300618 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 34 bytes successfully. Data preview (hex): 0020d6f6874b843dec388689bdfb1a62a2071185...
2026-02-02T15:31:55.300618 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(589c2a6c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.300618 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(589c2a6c) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.300618 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c86b59b960b7b7b63960e34afed33b73a3b287a80f29af5fba4da6049d90a7676d11fdd389b891a4190bda6857bcd807049b07a2c71fe6f18e37adede0fb129b6ba592ba383f9a2829cac45d7bdd9728ca61f265fe5e6de87d08afde0ab78225b040b7ca2f42c3bd6bc24a41ab514cdf99a1bfad5fcab25b60232bb6d47b5911447d89fde2945acbcfaa81217fca85d285248cb78faeac27e47047257afb9f9c0a6073a3e770ac357cec92e3d386f0a465f309e933cabba4129ce9263cf4ba5a126ff94de56fb3a550
2026-02-02T15:31:55.300618 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(589c2a6c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.301623 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(589c2a6c) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 6b59b960b7b7b63960e34afed33b73a3b287a80f29af5fba4da6049d90a7676d11fdd389b891a4190bda6857bcd807049b07a2c71fe6f18e37adede0fb129b6ba592ba383f9a2829cac45d7bdd9728ca61f265fe5e6de87d08afde0ab78225b040b7ca2f42c3bd6bc24a41ab514cdf99a1bfad5fcab25b60232bb6d47b5911447d89fde2945acbcfaa81217fca85d285248cb78faeac27e47047257afb9f9c0a6073a3e770ac357cec92e3d386f0a465f309e933cabba4129ce9263cf4ba5a126ff94de56fb3a550
2026-02-02T15:31:55.301623 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f2d9c202) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:31:55.301623 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f2d9c202) END (from buffer). Returning 200 bytes: 6b59b960b7b7b63960e34afed33b73a3b287a80f29af5fba4da6049d90a7676d11fdd389b891a4190bda6857bcd807049b07a2c71fe6f18e37adede0fb129b6ba592ba383f9a2829cac45d7bdd9728ca61f265fe5e6de87d08afde0ab78225b040b7ca2f42c3bd6bc24a41ab514cdf99a1bfad5fcab25b60232bb6d47b5911447d89fde2945acbcfaa81217fca85d285248cb78faeac27e47047257afb9f9c0a6073a3e770ac357cec92e3d386f0a465f309e933cabba4129ce9263cf4ba5a126ff94de56fb3a550. Buffer after: 0 bytes: 
2026-02-02T15:31:55.301623 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:31:55.334740 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:55.335278 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 170 bytes: 00a85048c5e6c28d843f518feade47f22e88ed9496528ca65065b9e31c300aa37ff5add6883f8a636d98edeb7d3b10dd7c49d5dd8999a7e3eb6f2f835dc49c1d3f642172d4c1869543f26ff4594597f9dd8a6376cd4b132aca05d16306ca88c0b87c946d8d1eb2d5c9cd186f5e3c29d631f1dea45178badce78edf960f2d5388e36d3da0f89fb7265b624997680007d9fb314b4a29d7a8faec7c9581611938b11c2dc241263d0cea2d97
2026-02-02T15:31:55.335822 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 170 bytes successfully. Data preview (hex): 00a85048c5e6c28d843f518feade47f22e88ed94...
2026-02-02T15:31:55.335822 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.335822 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:55.336874 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1064099713
2026-02-02T15:31:55.336874 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1064947538
2026-02-02T15:31:55.336874 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.336874 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.337861 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:55.337861 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:55.338366 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:55.338366 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:55.338366 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 38 bytes: 0024e4524d92b972b9547ba64a1777a153d45683482c3583dfd48ba7c87a5a52e787da205174
2026-02-02T15:31:55.338366 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 38 bytes successfully. Data preview (hex): 0024e4524d92b972b9547ba64a1777a153d45683...
2026-02-02T15:31:55.339886 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:55.339886 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.339886 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.339886 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.339886 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:55.339886 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:55.339886 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.340899 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.340899 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(61446695) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.340899 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(61446695) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.341908 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (208 bytes): 00a85048c5e6c28d843f518feade47f22e88ed9496528ca65065b9e31c300aa37ff5add6883f8a636d98edeb7d3b10dd7c49d5dd8999a7e3eb6f2f835dc49c1d3f642172d4c1869543f26ff4594597f9dd8a6376cd4b132aca05d16306ca88c0b87c946d8d1eb2d5c9cd186f5e3c29d631f1dea45178badce78edf960f2d5388e36d3da0f89fb7265b624997680007d9fb314b4a29d7a8faec7c9581611938b11c2dc241263d0cea2d970024e4524d92b972b9547ba64a1777a153d45683482c3583dfd48ba7c87a5a52e787da205174
2026-02-02T15:31:55.341908 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(71353a69) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.341908 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(71353a69) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 206 bytes: 5048c5e6c28d843f518feade47f22e88ed9496528ca65065b9e31c300aa37ff5add6883f8a636d98edeb7d3b10dd7c49d5dd8999a7e3eb6f2f835dc49c1d3f642172d4c1869543f26ff4594597f9dd8a6376cd4b132aca05d16306ca88c0b87c946d8d1eb2d5c9cd186f5e3c29d631f1dea45178badce78edf960f2d5388e36d3da0f89fb7265b624997680007d9fb314b4a29d7a8faec7c9581611938b11c2dc241263d0cea2d970024e4524d92b972b9547ba64a1777a153d45683482c3583dfd48ba7c87a5a52e787da205174
2026-02-02T15:31:55.341908 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(a6408065) START. Requested: 168. Buffer: 206 bytes.
2026-02-02T15:31:55.342422 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(a6408065) END (from buffer). Returning 168 bytes: 5048c5e6c28d843f518feade47f22e88ed9496528ca65065b9e31c300aa37ff5add6883f8a636d98edeb7d3b10dd7c49d5dd8999a7e3eb6f2f835dc49c1d3f642172d4c1869543f26ff4594597f9dd8a6376cd4b132aca05d16306ca88c0b87c946d8d1eb2d5c9cd186f5e3c29d631f1dea45178badce78edf960f2d5388e36d3da0f89fb7265b624997680007d9fb314b4a29d7a8faec7c9581611938b11c2dc241263d0cea2d97. Buffer after: 38 bytes: 0024e4524d92b972b9547ba64a1777a153d45683482c3583dfd48ba7c87a5a52e787da205174
2026-02-02T15:31:55.342422 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:55.351283 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.351283 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:55.351283 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1064947538
2026-02-02T15:31:55.351786 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1064099713
2026-02-02T15:31:55.351786 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:55.351786 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:55.351786 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.352295 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(5b5b1844) START. Requested: 2. Buffer: 38 bytes.
2026-02-02T15:31:55.352295 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(5b5b1844) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: e4524d92b972b9547ba64a1777a153d45683482c3583dfd48ba7c87a5a52e787da205174
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:55.352295 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(cd6a3825) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:55.352295 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(cd6a3825) END (from buffer). Returning 36 bytes: e4524d92b972b9547ba64a1777a153d45683482c3583dfd48ba7c87a5a52e787da205174. Buffer after: 0 bytes: 
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [228, 82, 77, 146]
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: e4524d92b972b9547ba64a1777a153d45683482c3583dfd48ba7c87a5a52e787da205174
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e4524d92b972b9547ba64a1777a153d45683482c
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3583dfd48ba7c87a5a52e787da205174
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [228, 82, 77, 146]
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [53, 131, 223, 212]
2026-02-02T15:31:55.352295 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [53, 131, 223, 212, 139, 167, 200, 122, 90, 82, 231, 135, 218, 32, 81, 116]
2026-02-02T15:31:55.352295 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.353814 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.353814 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:55.353814 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.353814 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:55.353814 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.354396 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:55.354396 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:55.354396 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:55.354396 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:55.354396 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:55.354396 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:55.354396 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 38 bytes: 0024b5387926f489a9e686bfa38a961c763835f4dace574ca39d1e69877699a50875afe2cc4b
2026-02-02T15:31:55.355908 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 38 bytes successfully. Data preview (hex): 0024b5387926f489a9e686bfa38a961c763835f4...
2026-02-02T15:31:55.356427 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:55.356427 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:55.356427 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:55.356427 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.356427 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.356427 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.356902 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:55.356902 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:55.356902 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.356902 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.356902 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(fae74150) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.356902 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(fae74150) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.357408 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024b5387926f489a9e686bfa38a961c763835f4dace574ca39d1e69877699a50875afe2cc4b
2026-02-02T15:31:55.357408 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(61446695) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.357408 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(61446695) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: b5387926f489a9e686bfa38a961c763835f4dace574ca39d1e69877699a50875afe2cc4b
2026-02-02T15:31:55.357408 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:55.357408 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.357408 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:55.357408 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:55.357408 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:55.357408 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:55.357408 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:55.357408 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(5019e5df) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:55.357408 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(5019e5df) END (from buffer). Returning 36 bytes: b5387926f489a9e686bfa38a961c763835f4dace574ca39d1e69877699a50875afe2cc4b. Buffer after: 0 bytes: 
2026-02-02T15:31:55.357408 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [181, 56, 121, 38]
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: b5387926f489a9e686bfa38a961c763835f4dace574ca39d1e69877699a50875afe2cc4b
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b5387926f489a9e686bfa38a961c763835f4dace
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 574ca39d1e69877699a50875afe2cc4b
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [181, 56, 121, 38]
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [87, 76, 163, 157]
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [87, 76, 163, 157, 30, 105, 135, 118, 153, 165, 8, 117, 175, 226, 204, 75]
2026-02-02T15:31:55.358535 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.358535 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.359534 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:55.359534 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.359534 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:55.359534 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.359534 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:55.359534 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:55.359534 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:55.360535 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:55.360535 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 32 bytes: 001e7d1e2b1b00065b864432f145cc6e3f03bb4b18b82c4a111e1363d4606d79
2026-02-02T15:31:55.360535 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 32 bytes successfully. Data preview (hex): 001e7d1e2b1b00065b864432f145cc6e3f03bb4b...
2026-02-02T15:31:55.360535 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:55.360535 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.360535 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.360535 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.360535 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:55.361535 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:55.361535 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.361535 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.361535 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c834ac9f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.361535 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c834ac9f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.361535 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e7d1e2b1b00065b864432f145cc6e3f03bb4b18b82c4a111e1363d4606d79
2026-02-02T15:31:55.363042 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(fae74150) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.363042 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(fae74150) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 7d1e2b1b00065b864432f145cc6e3f03bb4b18b82c4a111e1363d4606d79
2026-02-02T15:31:55.363042 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:55.363042 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.366583 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:55.367619 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:55.367619 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:55.367619 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:55.367619 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:55.367619 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(212ed39b) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:55.367619 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(212ed39b) END (from buffer). Returning 30 bytes: 7d1e2b1b00065b864432f145cc6e3f03bb4b18b82c4a111e1363d4606d79. Buffer after: 0 bytes: 
2026-02-02T15:31:55.367619 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [125, 30, 43, 27]
2026-02-02T15:31:55.367619 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:55.367619 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 7d1e2b1b00065b864432f145cc6e3f03bb4b18b82c4a111e1363d4606d79
2026-02-02T15:31:55.368618 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:55.368618 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:55.368618 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7d1e2b1b00065b864432f145cc6e
2026-02-02T15:31:55.368618 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3f03bb4b18b82c4a111e1363d4606d79
2026-02-02T15:31:55.369615 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [125, 30, 43, 27]
2026-02-02T15:31:55.369615 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [63, 3, 187, 75]
2026-02-02T15:31:55.369615 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [63, 3, 187, 75, 24, 184, 44, 74, 17, 30, 19, 99, 212, 96, 109, 121]
2026-02-02T15:31:55.369615 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.369615 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.369615 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:55.369615 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.369615 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:55.369615 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.370620 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:55.370620 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:55.370620 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:55.370620 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:55.370620 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:55.371615 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:55.371615 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:55.371615 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 32 bytes: 001e34816a56179c4f20cb4ba4caa635d6d2433e4d42ae5819f710d300856554
2026-02-02T15:31:55.371615 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 32 bytes successfully. Data preview (hex): 001e34816a56179c4f20cb4ba4caa635d6d2433e...
2026-02-02T15:31:55.372616 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:55.372616 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:55.372616 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:55.372616 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:55.372616 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.372616 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067915372-9031
2026-02-02T15:31:55.373614 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.373614 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:55.373614 [FINE] [SwarmConn] SwarmConn (0): Context set: f6780395-1033-4b88-923b-6cd3bade1829
2026-02-02T15:31:55.373614 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, conn_id=0
2026-02-02T15:31:55.373614 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj": 1
2026-02-02T15:31:55.373614 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:31:55.373614 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.373614 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. Conn ID: 0
2026-02-02T15:31:55.373614 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.373614 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.373614 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.373614 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:55.375120 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e34816a56179c4f20cb4ba4caa635d6d2433e4d42ae5819f710d300856554
2026-02-02T15:31:55.375120 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c834ac9f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.375120 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c834ac9f) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 34816a56179c4f20cb4ba4caa635d6d2433e4d42ae5819f710d300856554
2026-02-02T15:31:55.375120 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:55.375120 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.375120 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:55.375120 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:55.375120 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:55.376143 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:55.376143 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:55.376143 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(88124be3) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:55.376647 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(88124be3) END (from buffer). Returning 30 bytes: 34816a56179c4f20cb4ba4caa635d6d2433e4d42ae5819f710d300856554. Buffer after: 0 bytes: 
2026-02-02T15:31:55.376647 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [52, 129, 106, 86]
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 34816a56179c4f20cb4ba4caa635d6d2433e4d42ae5819f710d300856554
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 34816a56179c4f20cb4ba4caa635
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: d6d2433e4d42ae5819f710d300856554
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [52, 129, 106, 86]
2026-02-02T15:31:55.376647 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [214, 210, 67, 62]
2026-02-02T15:31:55.377663 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [214, 210, 67, 62, 77, 66, 174, 88, 25, 247, 16, 211, 0, 133, 101, 84]
2026-02-02T15:31:55.377663 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.377663 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.377663 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:55.377663 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.377663 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:55.377663 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.378663 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.378663 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo at /ip4/127.0.0.1/tcp/4602
2026-02-02T15:31:55.379167 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4602
2026-02-02T15:31:55.379167 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.379167 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067915379-2653
2026-02-02T15:31:55.379167 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.379680 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:55.379680 [FINE] [SwarmConn] SwarmConn (0): Context set: 9978b96c-99fc-48bd-8509-cfe3ada308eb
2026-02-02T15:31:55.379680 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: 111ms
2026-02-02T15:31:55.380152 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.380152 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.380152 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.380152 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.380152 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.380152 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.380152 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.380152 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.380152 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.380152 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(10370e4d) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.381160 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(10370e4d) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.381160 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.381160 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.381160 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.381160 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.381160 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.381160 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.381160 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.381160 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.381160 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.381160 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(25da26d4) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.381160 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(25da26d4) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.397295 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:31:55.397800 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.397800 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Conn ID: 0
2026-02-02T15:31:55.397800 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.397800 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.397800 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:55.397800 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Context HashCode: 737073965
2026-02-02T15:31:55.397800 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:55.398805 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:55.398805 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:55.399185 [FINE] [YamuxStream] [5][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:55.399185 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.399185 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:55.399185 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:55.399185 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Conn ID: 0
2026-02-02T15:31:55.400189 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:55.400189 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:55.400189 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c89dc263fca50b01a03648b29aed7f093b264e0f4c1e18692dfa06152
2026-02-02T15:31:55.400694 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c89dc263fca50b01a03648b29aed7f093b264...
2026-02-02T15:31:55.401697 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c89dc263fca50b01a03648b29aed7f093b264e0f4c1e18692dfa06152
2026-02-02T15:31:55.401697 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(10370e4d) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.402201 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(10370e4d) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 89dc263fca50b01a03648b29aed7f093b264e0f4c1e18692dfa06152
2026-02-02T15:31:55.402201 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:55.402201 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:55.402201 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(3b6a547e) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:55.402201 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(3b6a547e) END (from buffer). Returning 28 bytes: 89dc263fca50b01a03648b29aed7f093b264e0f4c1e18692dfa06152. Buffer after: 0 bytes: 
2026-02-02T15:31:55.402201 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [137, 220, 38, 63]
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 89dc263fca50b01a03648b29aed7f093b264e0f4c1e18692dfa06152
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 89dc263fca50b01a03648b29
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: aed7f093b264e0f4c1e18692dfa06152
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [137, 220, 38, 63]
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [174, 215, 240, 147]
2026-02-02T15:31:55.402201 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [174, 215, 240, 147, 178, 100, 224, 244, 193, 225, 134, 146, 223, 160, 97, 82]
2026-02-02T15:31:55.402201 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.419860 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.419860 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:55.419860 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:55.419860 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:55.419860 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.419860 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.420861 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:55.420861 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:55.420861 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:55.422859 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:55.422859 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 30 bytes: 001cf998aadc08f8be374c31cb41a1768cbbcd6f3267f267617451403719
2026-02-02T15:31:55.424068 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 30 bytes successfully. Data preview (hex): 001cf998aadc08f8be374c31cb41a1768cbbcd6f...
2026-02-02T15:31:55.424068 [FINE] [YamuxStream] [4][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:55.424068 [FINER] [YamuxStream] [4][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:55.424068 [FINE] [YamuxStream] [4][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:55.424068 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:55.424068 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:55.425572 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:55.425572 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:55.426609 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 30 bytes: 001c76cc9f1009710ff25b95f8e9458ddd9cfef0a76e1748ad1ded24033e
2026-02-02T15:31:55.426609 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 30 bytes successfully. Data preview (hex): 001c76cc9f1009710ff25b95f8e9458ddd9cfef0...
2026-02-02T15:31:55.428115 [FINER] [YamuxStream] [4][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:55.428115 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj on conn 0
2026-02-02T15:31:55.428636 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067915428-3680 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.429157 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:55.429157 [FINEST] [YamuxStream] [4][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:55.444014 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001cf998aadc08f8be374c31cb41a1768cbbcd6f3267f267617451403719001c76cc9f1009710ff25b95f8e9458ddd9cfef0a76e1748ad1ded24033e
2026-02-02T15:31:55.444014 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(25da26d4) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.444014 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(25da26d4) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: f998aadc08f8be374c31cb41a1768cbbcd6f3267f267617451403719001c76cc9f1009710ff25b95f8e9458ddd9cfef0a76e1748ad1ded24033e
2026-02-02T15:31:55.444014 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:55.444014 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:55.444014 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f899e8e5) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:31:55.444014 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f899e8e5) END (from buffer). Returning 28 bytes: f998aadc08f8be374c31cb41a1768cbbcd6f3267f267617451403719. Buffer after: 30 bytes: 001c76cc9f1009710ff25b95f8e9458ddd9cfef0a76e1748ad1ded24033e
2026-02-02T15:31:55.444014 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [249, 152, 170, 220]
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: f998aadc08f8be374c31cb41a1768cbbcd6f3267f267617451403719
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:55.444014 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: f998aadc08f8be374c31cb41
2026-02-02T15:31:55.454042 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a1768cbbcd6f3267f267617451403719
2026-02-02T15:31:55.454042 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [249, 152, 170, 220]
2026-02-02T15:31:55.454042 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [161, 118, 140, 187]
2026-02-02T15:31:55.454042 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [161, 118, 140, 187, 205, 111, 50, 103, 242, 103, 97, 116, 81, 64, 55, 25]
2026-02-02T15:31:55.469564 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.469564 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.470603 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:55.470603 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:55.473602 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:55.473602 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.473602 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.474602 [FINER] [YamuxStream] [5][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:55.474602 [FINER] [YamuxStream] [5][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:55.474602 [FINE] [YamuxStream] [5][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:55.474602 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:55.474602 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:55.474602 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:55.474602 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:55.474602 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c237fcd9a90f91bf1d98ca0be57ff27f6154a00dad6d22fe8997efc5b
2026-02-02T15:31:55.475601 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c237fcd9a90f91bf1d98ca0be57ff27f6154a...
2026-02-02T15:31:55.475601 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:55.475601 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:55.475601 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067915475-127 for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.475601 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:55.475601 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:55.476601 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, stream_id=1, protocol=/ipfs/id/1.0.0, duration=78ms
2026-02-02T15:31:55.476601 [FINE] [YamuxStream] [5][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:25.476601
2026-02-02T15:31:55.476601 [FINE] [YamuxStream] [5][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:55.476601 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.476601 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:55.476601 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:55.476601 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:55.477600 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:55.477600 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:55.477600 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 50 bytes: 0030d7f15bbea90acba43bfc936340b5782fb363831bfe3325bf73eefc63e611c78dbee011f2ec1476b2976a42cfd9de7251
2026-02-02T15:31:55.478601 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.478601 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.478601 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.478601 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.478601 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.478601 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.478601 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.478601 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.478601 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.478601 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0a6f679c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.479599 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0a6f679c) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.485656 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.485656 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.485656 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.485656 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.485656 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.485656 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.485656 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.485656 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.485656 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.486656 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(ff48c01b) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:55.486656 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(ff48c01b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 76cc9f1009710ff25b95f8e9458ddd9cfef0a76e1748ad1ded24033e
2026-02-02T15:31:55.486656 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:55.486656 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.486656 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:55.486656 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:55.486656 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:55.486656 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:55.487655 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:55.487655 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d1afc3a4) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:55.487655 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d1afc3a4) END (from buffer). Returning 28 bytes: 76cc9f1009710ff25b95f8e9458ddd9cfef0a76e1748ad1ded24033e. Buffer after: 0 bytes: 
2026-02-02T15:31:55.487655 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [118, 204, 159, 16]
2026-02-02T15:31:55.487655 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:55.487655 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 76cc9f1009710ff25b95f8e9458ddd9cfef0a76e1748ad1ded24033e
2026-02-02T15:31:55.487655 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:55.487655 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:55.489654 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 76cc9f1009710ff25b95f8e9
2026-02-02T15:31:55.489654 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 458ddd9cfef0a76e1748ad1ded24033e
2026-02-02T15:31:55.489654 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [118, 204, 159, 16]
2026-02-02T15:31:55.489654 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [69, 141, 221, 156]
2026-02-02T15:31:55.490160 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [69, 141, 221, 156, 254, 240, 167, 110, 23, 72, 173, 29, 237, 36, 3, 62]
2026-02-02T15:31:55.490160 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.490160 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.490160 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:55.490160 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:55.490160 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:55.491164 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.491164 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.491164 [FINER] [YamuxStream] [5][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:55.491164 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c237fcd9a90f91bf1d98ca0be57ff27f6154a00dad6d22fe8997efc5b
2026-02-02T15:31:55.494163 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0a6f679c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.494163 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0a6f679c) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 237fcd9a90f91bf1d98ca0be57ff27f6154a00dad6d22fe8997efc5b
2026-02-02T15:31:55.494163 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:55.494163 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.494163 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:55.494163 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:55.494163 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:55.494163 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:55.495165 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:55.495165 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7ebbba89) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:55.495165 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7ebbba89) END (from buffer). Returning 28 bytes: 237fcd9a90f91bf1d98ca0be57ff27f6154a00dad6d22fe8997efc5b. Buffer after: 0 bytes: 
2026-02-02T15:31:55.495165 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [35, 127, 205, 154]
2026-02-02T15:31:55.529902 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:55.529902 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 237fcd9a90f91bf1d98ca0be57ff27f6154a00dad6d22fe8997efc5b
2026-02-02T15:31:55.529902 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:55.529902 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:55.529902 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 237fcd9a90f91bf1d98ca0be
2026-02-02T15:31:55.529902 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 57ff27f6154a00dad6d22fe8997efc5b
2026-02-02T15:31:55.529902 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [35, 127, 205, 154]
2026-02-02T15:31:55.537410 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [87, 255, 39, 246]
2026-02-02T15:31:55.537410 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [87, 255, 39, 246, 21, 74, 0, 218, 214, 210, 47, 232, 153, 126, 252, 91]
2026-02-02T15:31:55.537410 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.537410 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.537410 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:55.537410 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:55.538409 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:55.538409 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.538409 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.538409 [FINER] [YamuxStream] [4][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:55.538409 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 50 bytes successfully. Data preview (hex): 0030d7f15bbea90acba43bfc936340b5782fb363...
2026-02-02T15:31:55.538409 [FINE] [YamuxStream] [5][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 61ms
2026-02-02T15:31:55.538409 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:55.539916 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.539916 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.539916 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.539916 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.539916 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.539916 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.539916 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.539916 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.539916 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.540934 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f32a854b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.540934 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f32a854b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.540934 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030d7f15bbea90acba43bfc936340b5782fb363831bfe3325bf73eefc63e611c78dbee011f2ec1476b2976a42cfd9de7251
2026-02-02T15:31:55.548122 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.548122 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.548122 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.548122 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.548122 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.548122 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.549136 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.549136 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.549136 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.549136 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(322d57f1) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:55.549136 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(322d57f1) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: d7f15bbea90acba43bfc936340b5782fb363831bfe3325bf73eefc63e611c78dbee011f2ec1476b2976a42cfd9de7251
2026-02-02T15:31:55.549136 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:55.549136 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.550135 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:55.550135 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:55.550135 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:55.550135 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:55.550135 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:55.550135 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(16530c9f) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:55.551135 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(16530c9f) END (from buffer). Returning 48 bytes: d7f15bbea90acba43bfc936340b5782fb363831bfe3325bf73eefc63e611c78dbee011f2ec1476b2976a42cfd9de7251. Buffer after: 0 bytes: 
2026-02-02T15:31:55.551135 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [215, 241, 91, 190]
2026-02-02T15:31:55.551135 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: d7f15bbea90acba43bfc936340b5782fb363831bfe3325bf73eefc63e611c78dbee011f2ec1476b2976a42cfd9de7251
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d7f15bbea90acba43bfc936340b5782fb363831bfe3325bf73eefc63e611c78d
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: bee011f2ec1476b2976a42cfd9de7251
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [215, 241, 91, 190]
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [190, 224, 17, 242]
2026-02-02T15:31:55.552135 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [190, 224, 17, 242, 236, 20, 118, 178, 151, 106, 66, 207, 217, 222, 114, 81]
2026-02-02T15:31:55.552639 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.552639 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.552639 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:55.552639 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:55.552639 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:55.552639 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.552639 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.553642 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:55.553642 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.553642 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.553642 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.553642 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:55.553642 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:55.553642 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.553642 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:55.553642 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.553642 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:55.554642 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:55.554642 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:55.554642 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:55.554642 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:55.554642 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:55.554642 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:55.554642 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:55.555644 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:55.555644 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:55.555644 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 50 bytes: 0030da56c2c23eeb7c14bd8e7b58563b7bc4369809b19cdcf39e2b2a06548cb3697ede6f2262c813373fc651877684b19ac9
2026-02-02T15:31:55.556643 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 50 bytes successfully. Data preview (hex): 0030da56c2c23eeb7c14bd8e7b58563b7bc43698...
2026-02-02T15:31:55.556643 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 2ms
2026-02-02T15:31:55.557642 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:55.557642 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:55.557642 [FINEST] [YamuxStream] [4][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:55.558148 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.558148 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.558148 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.558148 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.558148 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.558148 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.558148 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.558148 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.558148 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.559152 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(cc3956c7) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.559152 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(cc3956c7) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.559152 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030da56c2c23eeb7c14bd8e7b58563b7bc4369809b19cdcf39e2b2a06548cb3697ede6f2262c813373fc651877684b19ac9
2026-02-02T15:31:55.559152 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f32a854b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.559152 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f32a854b) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: da56c2c23eeb7c14bd8e7b58563b7bc4369809b19cdcf39e2b2a06548cb3697ede6f2262c813373fc651877684b19ac9
2026-02-02T15:31:55.559152 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:55.559152 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.559152 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:55.560151 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:55.560151 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:55.560151 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:55.560151 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:55.560151 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(df808e73) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:55.560151 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(df808e73) END (from buffer). Returning 48 bytes: da56c2c23eeb7c14bd8e7b58563b7bc4369809b19cdcf39e2b2a06548cb3697ede6f2262c813373fc651877684b19ac9. Buffer after: 0 bytes: 
2026-02-02T15:31:55.560151 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [218, 86, 194, 194]
2026-02-02T15:31:55.560151 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: da56c2c23eeb7c14bd8e7b58563b7bc4369809b19cdcf39e2b2a06548cb3697ede6f2262c813373fc651877684b19ac9
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: da56c2c23eeb7c14bd8e7b58563b7bc4369809b19cdcf39e2b2a06548cb3697e
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: de6f2262c813373fc651877684b19ac9
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [218, 86, 194, 194]
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [222, 111, 34, 98]
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [222, 111, 34, 98, 200, 19, 55, 63, 198, 81, 135, 118, 132, 177, 154, 201]
2026-02-02T15:31:55.561152 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.561152 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:55.561152 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:55.561152 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.562657 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.562657 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:55.562657 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.562657 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.562657 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.562657 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:55.562657 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:55.562657 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.563698 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:55.563698 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.563698 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:55.563698 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:55.563698 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:55.563698 [FINE] [YamuxStream] [5][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:55.563698 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:55.563698 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:55.564697 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:55.564697 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:55.564697 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 46 bytes: 002c77f413ff0246f50b0d4d802d4b6c779c45e9bd0a8f1677260e146c2fe28683f4bebe0b10b554428cbd5fa17c
2026-02-02T15:31:55.564697 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 46 bytes successfully. Data preview (hex): 002c77f413ff0246f50b0d4d802d4b6c779c45e9...
2026-02-02T15:31:55.564697 [FINE] [YamuxStream] [5][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:31:55.564697 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:55.565696 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.565696 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.565696 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.565696 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.565696 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.565696 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.565696 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.565696 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.565696 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.565696 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f780f81f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.565696 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f780f81f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.565696 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c77f413ff0246f50b0d4d802d4b6c779c45e9bd0a8f1677260e146c2fe28683f4bebe0b10b554428cbd5fa17c
2026-02-02T15:31:55.565696 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(cc3956c7) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.566696 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(cc3956c7) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 77f413ff0246f50b0d4d802d4b6c779c45e9bd0a8f1677260e146c2fe28683f4bebe0b10b554428cbd5fa17c
2026-02-02T15:31:55.566696 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:55.566696 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:55.566696 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(099f2489) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:55.566696 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(099f2489) END (from buffer). Returning 44 bytes: 77f413ff0246f50b0d4d802d4b6c779c45e9bd0a8f1677260e146c2fe28683f4bebe0b10b554428cbd5fa17c. Buffer after: 0 bytes: 
2026-02-02T15:31:55.566696 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [119, 244, 19, 255]
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 77f413ff0246f50b0d4d802d4b6c779c45e9bd0a8f1677260e146c2fe28683f4bebe0b10b554428cbd5fa17c
2026-02-02T15:31:55.566696 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 77f413ff0246f50b0d4d802d4b6c779c45e9bd0a8f1677260e146c2f
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e28683f4bebe0b10b554428cbd5fa17c
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [119, 244, 19, 255]
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [226, 134, 131, 244]
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [226, 134, 131, 244, 190, 190, 11, 16, 181, 84, 66, 140, 189, 95, 161, 124]
2026-02-02T15:31:55.567697 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.567697 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:55.567697 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:55.567697 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:55.568694 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:55.568694 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:55.568694 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.568694 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:55.568694 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:55.568694 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:55.569695 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:55.569695 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:55.569695 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:55.569695 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:55.569695 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:55.569695 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:55.569695 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:55.569695 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:55.569695 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 46 bytes: 002cb8daa39b17e0d135fa8f9e0ba99dce6cc711448df05241662fd6c52213a4bcf2aee4b65a170e333d22ff1d77
2026-02-02T15:31:55.570693 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 46 bytes successfully. Data preview (hex): 002cb8daa39b17e0d135fa8f9e0ba99dce6cc711...
2026-02-02T15:31:55.570693 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:31:55.570693 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:55.570693 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:55.570693 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:55.570693 [FINE] [StreamScopeImpl] stream-1770067915428-3680: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.570693 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:55.581727 [FINE] [StreamScopeImpl] stream-1770067915428-3680: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:55.583232 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:55.584236 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj (reported as 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj) on stream 1
2026-02-02T15:31:55.584236 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. IsPush: false. Stream ID: 1
2026-02-02T15:31:55.585236 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. IsPush: false. Stream ID: 1
2026-02-02T15:31:55.585581 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.585581 [FINE] [StreamScopeImpl] stream-1770067915428-3680: Setting service to libp2p.identify for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, protocol /ipfs/id/1.0.0
2026-02-02T15:31:55.585581 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:55.585581 [FINE] [StreamScopeImpl] stream-1770067915428-3680: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:55.586086 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.586086 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj: seq=4, protocols=7, addrs=2
2026-02-02T15:31:55.586086 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. Snapshot seq: 4
2026-02-02T15:31:55.586086 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58550 for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.586086 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4602, RemoteAddr: /ip4/127.0.0.1/tcp/58550, ViaLoopback: true for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.586086 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.587102 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.587102 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:55.587102 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:55.587102 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:55.587102 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.587102 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58550)
2026-02-02T15:31:55.587102 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. Total message size: 435 bytes. SignedPeerRecord present: true
2026-02-02T15:31:55.589101 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 435).
2026-02-02T15:31:55.589101 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 437 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:55.590100 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 449, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 181, 179, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:31:55.591099 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:55.591099 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 465 bytes (plaintext was 449)
2026-02-02T15:31:55.591099 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 467
2026-02-02T15:31:55.591099 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 467 bytes: 01d1c0c68f8517af4b96a6e2b644119d272b377d62960745edfdc798f55a9ae38877a0dcf2c88369f2f0273f0910e80e7aec396660a7776af0252b174082f96943451291608a4a2cab124be934271526f991dbc4a82d7d62dfed42de0ac402b2ce12739fb0c684e3647ca42f32ccb534f05d91496c3c6286e3a513c634ff31d6eb589f57174121cd840ff5189e87d8065b130c8eb070f0605a01dc741a5688414edfe892747fa2299fa04eea761cb2f389ec6a000c6dbbec724b121e80da1c9daac9d29b8ca46309581ee3e2a4a6de820c83fd58dd5b8929838a763e980ccb8e84eb781c7f4fd445f49265dec1585be647a2ee1857c0fb5b379858b4d0adad251512de006c236a8e9d52810636d2c12ef775400a40681ccb9bb41584a680115e93af990e8c7df65afe3c1341d88fff6b01b2ce25eaa2851e9e8f40e7de0d6d37f27ca03e700da0d863f0f587d1578a42afe68d8b9aa40a10d1b611d571b739acf400858795e932e9a2d1ec04c82cca281ad9ed04eb274018944584f1e63df4dbf95477c750054cad392aac8e866b93e26dc0beafc29105785e56a4cd381c6e7befafb84aef9697f0420390b4430ed35826115eb043c7c68ed7949a3eb97ff9fdba9b90442d13a85b8fdb462b86d9639aed086b
2026-02-02T15:31:55.592099 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.592099 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.592099 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.592099 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.593098 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.593098 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.593098 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.593098 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.593098 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.593098 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(4d9353fa) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.593603 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(4d9353fa) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.593603 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (513 bytes): 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
2026-02-02T15:31:55.593603 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f780f81f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.593603 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f780f81f) END (from buffer). Returning 2 bytes: 002c. Buffer after: 511 bytes: b8daa39b17e0d135fa8f9e0ba99dce6cc711448df05241662fd6c52213a4bcf2aee4b65a170e333d22ff1d7701d1c0c68f8517af4b96a6e2b644119d272b377d62960745edfdc798f55a9ae38877a0dcf2c88369f2f0273f0910e80e7aec396660a7776af0252b174082f96943451291608a4a2cab124be934271526f991dbc4a82d7d62dfed42de0ac402b2ce12739fb0c684e3647ca42f32ccb534f05d91496c3c6286e3a513c634ff31d6eb589f57174121cd840ff5189e87d8065b130c8eb070f0605a01dc741a5688414edfe892747fa2299fa04eea761cb2f389ec6a000c6dbbec724b121e80da1c9daac9d29b8ca46309581ee3e2a4a6de820c83fd58dd5b8929838a763e980ccb8e84eb781c7f4fd445f49265dec1585be647a2ee1857c0fb5b379858b4d0adad251512de006c236a8e9d52810636d2c12ef775400a40681ccb9bb41584a680115e93af990e8c7df65afe3c1341d88fff6b01b2ce25eaa2851e9e8f40e7de0d6d37f27ca03e700da0d863f0f587d1578a42afe68d8b9aa40a10d1b611d571b739acf400858795e932e9a2d1ec04c82cca281ad9ed04eb274018944584f1e63df4dbf95477c750054cad392aac8e866b93e26dc0beafc29105785e56a4cd381c6e7befafb84aef9697f0420390b4430ed35826115eb043c7c68ed7949a3eb97ff9fdba9b90442d13a85b8fdb462b86d9639aed086b
2026-02-02T15:31:55.593603 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:55.593603 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.593603 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:55.594616 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:55.594616 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f8d68963) START. Requested: 44. Buffer: 511 bytes.
2026-02-02T15:31:55.594616 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(f8d68963) END (from buffer). Returning 44 bytes: b8daa39b17e0d135fa8f9e0ba99dce6cc711448df05241662fd6c52213a4bcf2aee4b65a170e333d22ff1d77. Buffer after: 467 bytes: 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
2026-02-02T15:31:55.594616 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [184, 218, 163, 155]
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: b8daa39b17e0d135fa8f9e0ba99dce6cc711448df05241662fd6c52213a4bcf2aee4b65a170e333d22ff1d77
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b8daa39b17e0d135fa8f9e0ba99dce6cc711448df05241662fd6c522
2026-02-02T15:31:55.594616 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 13a4bcf2aee4b65a170e333d22ff1d77
2026-02-02T15:31:55.598290 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [184, 218, 163, 155]
2026-02-02T15:31:55.598290 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [19, 164, 188, 242]
2026-02-02T15:31:55.598290 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [19, 164, 188, 242, 174, 228, 182, 90, 23, 14, 51, 61, 34, 255, 29, 119]
2026-02-02T15:31:55.598290 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.598290 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.599294 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:55.599294 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:55.599294 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:55.599294 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.599294 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.599294 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:55.599294 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.600293 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.600293 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.600293 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:55.600293 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:55.600293 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:55.600293 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:55.600293 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.600293 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:55.600293 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:55.600293 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:55.601294 [FINE] [YamuxStream] [5][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:25.601294
2026-02-02T15:31:55.601294 [FINE] [StreamScopeImpl] stream-1770067915475-127: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.601294 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:55.601294 [FINE] [StreamScopeImpl] stream-1770067915475-127: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:55.601799 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:55.601799 [FINE] [StreamScopeImpl] stream-1770067915475-127: Setting service to libp2p.identify for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, protocol /ipfs/id/1.0.0
2026-02-02T15:31:55.601799 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:55.601799 [FINE] [StreamScopeImpl] stream-1770067915475-127: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:55.601799 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:55.601799 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 467 bytes successfully. Data preview (hex): 01d1c0c68f8517af4b96a6e2b644119d272b377d...
2026-02-02T15:31:55.601799 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 437 bytes in 12ms
2026-02-02T15:31:55.601799 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.601799 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.601799 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.601799 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj to 4.
2026-02-02T15:31:55.603316 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.603316 [FINER] [YamuxStream] [4][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:55.603316 [FINER] [YamuxStream] [4][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:55.603316 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:55.603316 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:55.604321 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:55.604321 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:55.604321 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 30 bytes: 001c792de41ce9e8f36f64d66f830c69b072d6ca672d27ada900f56600c0
2026-02-02T15:31:55.604825 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 30 bytes successfully. Data preview (hex): 001c792de41ce9e8f36f64d66f830c69b072d6ca...
2026-02-02T15:31:55.604825 [FINE] [YamuxStream] [4][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:55.605330 [FINE] [YamuxStream] [4][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:55.605330 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:55.605330 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj. IsPush: false.
2026-02-02T15:31:55.605845 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c792de41ce9e8f36f64d66f830c69b072d6ca672d27ada900f56600c0
2026-02-02T15:31:55.605845 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.605845 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.605845 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.605845 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.605845 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.605845 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.605845 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.605845 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.605845 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.606858 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(b4d7146a) START. Requested: 2. Buffer: 497 bytes.
2026-02-02T15:31:55.606858 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(b4d7146a) END (from buffer). Returning 2 bytes: 01d1. Buffer after: 495 bytes: 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
2026-02-02T15:31:55.606858 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 209]
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 209]
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01d1
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 465
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 465
2026-02-02T15:31:55.606858 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 465 more bytes (have 0/465)
2026-02-02T15:31:55.606858 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(1267a772) START. Requested: 465. Buffer: 495 bytes.
2026-02-02T15:31:55.606858 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(1267a772) END (from buffer). Returning 465 bytes: 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. Buffer after: 30 bytes: 001c792de41ce9e8f36f64d66f830c69b072d6ca672d27ada900f56600c0
2026-02-02T15:31:55.606858 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 465 bytes. First 4 bytes: [192, 198, 143, 133]
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 465, Got: 465
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 465, Bytes: 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
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 465
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(449) and MAC(16)
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 442d13a85b8fdb462b86d9639aed086b
2026-02-02T15:31:55.606858 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [192, 198, 143, 133]
2026-02-02T15:31:55.608362 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [68, 45, 19, 168]
2026-02-02T15:31:55.608362 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [68, 45, 19, 168, 91, 143, 219, 70, 43, 134, 217, 99, 154, 237, 8, 107]
2026-02-02T15:31:55.608362 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.608362 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.608362 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 449 bytes
2026-02-02T15:31:55.608362 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 449 bytes to _decryptedBuffer. New _decryptedBuffer.length: 449
2026-02-02T15:31:55.608362 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 437. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 181]
2026-02-02T15:31:55.608362 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.608362 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.609366 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=437
2026-02-02T15:31:55.609366 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.609366 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.609366 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.609366 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=437
2026-02-02T15:31:55.609366 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 437, _decryptedBuffer.length: 437
2026-02-02T15:31:55.609366 [FINER] [SecuredConnection] SecuredConnection.read (length=437): Returning 437 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [179, 3, 10, 36, 8, 1, 18, 32, 25, 168, 211, 119, 221, 115, 71, 59, 180, 113, 42, 21]
2026-02-02T15:31:55.609366 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=437
2026-02-02T15:31:55.609366 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.609366 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 437, flags: 0
2026-02-02T15:31:55.609366 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 437 bytes directly to waiting reader
2026-02-02T15:31:55.609366 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 473
2026-02-02T15:31:55.610366 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, 435 bytes, duration=8ms
2026-02-02T15:31:55.610366 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. IsPush: false.
2026-02-02T15:31:55.610366 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: 0
2026-02-02T15:31:55.610366 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: 7
2026-02-02T15:31:55.610934 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
2026-02-02T15:31:55.610934 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:31:55.610934 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo - Added protocols: 7, Removed protocols: 0
2026-02-02T15:31:55.610934 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: /ip4/127.0.0.1/tcp/58550
2026-02-02T15:31:55.610934 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58550 for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo via conn 0.
2026-02-02T15:31:55.610934 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.610934 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.610934 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo (181 bytes).
2026-02-02T15:31:55.610934 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:55.611938 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:55.619443 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:55.619443 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: true
2026-02-02T15:31:55.619443 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:55.619443 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:55.619443 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:55.619443 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.619443 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.619443 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo from record public key for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.619443 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.619443 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Found 2 addresses.
2026-02-02T15:31:55.620948 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: 2
2026-02-02T15:31:55.620948 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo based on remote connection address /ip4/127.0.0.1/tcp/4602. Before filter: 2
2026-02-02T15:31:55.620948 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4602 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:55.620948 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:55.620948 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: 2
2026-02-02T15:31:55.620948 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:55.620948 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.620948 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:55.622467 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.622467 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo from local peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj.
2026-02-02T15:31:55.622467 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.622467 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.623994 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo from received public key for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.623994 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo matches expected remote peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.623994 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Comparing with received key.
2026-02-02T15:31:55.623994 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo matches existing key in peerstore.
2026-02-02T15:31:55.623994 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:55.625514 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo in peerstore.
2026-02-02T15:31:55.626778 [FINE] [autonatv2] Peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo identification completed, updating peer map
2026-02-02T15:31:55.626778 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo supports push.
2026-02-02T15:31:55.627283 [FINER] [YamuxStream] [5][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:55.627283 [FINER] [YamuxStream] [5][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:55.627283 [FINE] [autonatv2] Updating peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr, /test/request/1.0.0], connectedness=Connectedness.connected
2026-02-02T15:31:55.627283 [FINE] [autonatv2] Adding peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:55.627787 [FINE] [ambient_autonat_v2] Peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo supports AutoNAT v2, scheduling probe
2026-02-02T15:31:55.627787 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:55.627787 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:55.627787 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:55.627787 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:55.627787 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:55.627787 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c81c5df02f6635ae0659657fdb3f480103c7d56bff46087128e72a102
2026-02-02T15:31:55.629799 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c81c5df02f6635ae0659657fdb3f480103c7d...
2026-02-02T15:31:55.630799 [FINE] [YamuxStream] [5][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:55.630799 [FINE] [YamuxStream] [5][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:55.630799 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, duration=232ms
2026-02-02T15:31:55.630799 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:55.630799 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.630799 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.630799 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.630799 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.631798 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.631798 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.631798 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(2b89edf1) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:55.631798 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(2b89edf1) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 792de41ce9e8f36f64d66f830c69b072d6ca672d27ada900f56600c0
2026-02-02T15:31:55.631798 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:55.631798 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:55.631798 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:55.632797 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(57ebb500) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:55.632797 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(57ebb500) END (from buffer). Returning 28 bytes: 792de41ce9e8f36f64d66f830c69b072d6ca672d27ada900f56600c0. Buffer after: 0 bytes: 
2026-02-02T15:31:55.632797 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [121, 45, 228, 28]
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 792de41ce9e8f36f64d66f830c69b072d6ca672d27ada900f56600c0
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 792de41ce9e8f36f64d66f83
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 0c69b072d6ca672d27ada900f56600c0
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [121, 45, 228, 28]
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [12, 105, 176, 114]
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [12, 105, 176, 114, 214, 202, 103, 45, 39, 173, 169, 0, 245, 102, 0, 192]
2026-02-02T15:31:55.632797 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:55.632797 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:55.632797 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:55.632797 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.632797 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.634302 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:55.634302 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:55.634302 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:55.635320 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c81c5df02f6635ae0659657fdb3f480103c7d56bff46087128e72a102
2026-02-02T15:31:55.635320 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(4d9353fa) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:55.635320 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(4d9353fa) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 81c5df02f6635ae0659657fdb3f480103c7d56bff46087128e72a102
2026-02-02T15:31:55.635320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:55.635320 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:55.635320 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:55.635320 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:55.635320 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:55.636320 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:55.636320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:55.636320 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(5307ef8c) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:55.636320 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(5307ef8c) END (from buffer). Returning 28 bytes: 81c5df02f6635ae0659657fdb3f480103c7d56bff46087128e72a102. Buffer after: 0 bytes: 
2026-02-02T15:31:55.637320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [129, 197, 223, 2]
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 81c5df02f6635ae0659657fdb3f480103c7d56bff46087128e72a102
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 81c5df02f6635ae0659657fd
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: b3f480103c7d56bff46087128e72a102
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [129, 197, 223, 2]
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [179, 244, 128, 16]
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [179, 244, 128, 16, 60, 125, 86, 191, 244, 96, 135, 18, 142, 114, 161, 2]
2026-02-02T15:31:55.637320 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:55.637320 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:55.638320 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:55.638320 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:55.638320 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:55.638320 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:55.638320 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:55.638320 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:55.638320 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:55.639320 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:55.639320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.639320 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.639320 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.639320 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.639320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.639320 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.639320 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.639320 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.639320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.639320 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c5201f01) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.639320 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c5201f01) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:55.640319 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:55.640319 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:55.640319 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:55.640319 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:55.640319 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:55.640319 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:55.640319 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:55.640319 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:55.641319 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:55.641319 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7d76433a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:55.641319 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7d76433a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.243628 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:31:56.244132 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:31:56.244132 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:31:56.244818 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:31:56.244818 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502: ServerSocket closed.
2026-02-02T15:31:56.244818 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4502 connectionStream is done. Removing listener.
2026-02-02T15:31:56.244818 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502 already closed.
2026-02-02T15:31:56.244818 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502: ConnectionController closed.
2026-02-02T15:31:56.245830 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWDtpKW1VaC5hoSniFoq3X6wZEzxukugNdoH3xPJrSnPu5
2026-02-02T15:31:56.246336 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503: ServerSocket closed.
2026-02-02T15:31:56.246336 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4503 connectionStream is done. Removing listener.
2026-02-02T15:31:56.246336 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503 already closed.
2026-02-02T15:31:56.246336 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503: ConnectionController closed.
2026-02-02T15:31:56.246336 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWNEMFwJ8uZMxAvBNHpY8jtJKxXDKHnrZs6ut1uFNh1ZcE
01:03 +922 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +923 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +924 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +925 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +926 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +927 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +928 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +929 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +930 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:03 +931 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:04 +932 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:04 +933 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:04 +934 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:04 +935 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendRequest should receive response
01:04 +935 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:56.634564 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, protocols: [/test/request/1.0.0]
2026-02-02T15:31:56.634564 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo...
2026-02-02T15:31:56.634564 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:56.634564 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo...
2026-02-02T15:31:56.635586 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Context HashCode: 413321306
2026-02-02T15:31:56.635586 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo.
2026-02-02T15:31:56.635586 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo).
2026-02-02T15:31:56.635586 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo, existing_conns=1
2026-02-02T15:31:56.635586 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo"
2026-02-02T15:31:56.635586 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo"
2026-02-02T15:31:56.635586 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Validating health...
2026-02-02T15:31:56.635586 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Returning newest connection ID: 0
2026-02-02T15:31:56.635586 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Conn runtimeType: SwarmConn, Conn ID: 0, Conn local: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj, Conn remote: 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:56.636584 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo on SwarmConn 0.
2026-02-02T15:31:56.636584 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Context HashCode: 413321306
2026-02-02T15:31:56.636584 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:56.636584 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:56.636584 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:56.636584 [FINE] [YamuxStream] [5][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:56.636584 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:56.636584 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:56.638089 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:56.638089 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:56.638089 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c9d680d51d2ec532401c3a174a070ff7885f0c15d19852f738feb0080
2026-02-02T15:31:56.639106 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c9d680d51d2ec532401c3a174a070ff7885f0c15d19852f738feb0080
2026-02-02T15:31:56.639106 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7d76433a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.639106 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7d76433a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 9d680d51d2ec532401c3a174a070ff7885f0c15d19852f738feb0080
2026-02-02T15:31:56.639106 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:56.640105 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:56.640105 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(a56c92f1) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:56.640105 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(a56c92f1) END (from buffer). Returning 28 bytes: 9d680d51d2ec532401c3a174a070ff7885f0c15d19852f738feb0080. Buffer after: 0 bytes: 
2026-02-02T15:31:56.640105 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [157, 104, 13, 81]
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 9d680d51d2ec532401c3a174a070ff7885f0c15d19852f738feb0080
2026-02-02T15:31:56.640105 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9d680d51d2ec532401c3a174
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a070ff7885f0c15d19852f738feb0080
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [157, 104, 13, 81]
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [160, 112, 255, 120]
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [160, 112, 255, 120, 133, 240, 193, 93, 25, 133, 47, 115, 143, 235, 0, 128]
2026-02-02T15:31:56.641106 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:56.641106 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:56.641106 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:56.642104 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.642104 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.642104 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:56.642104 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:56.642104 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:56.642104 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:56.642104 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 30 bytes: 001c5941ac69bba74362ee6addc22ae694f284804d4403478a61e9833ce8
2026-02-02T15:31:56.643104 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 30 bytes successfully. Data preview (hex): 001c5941ac69bba74362ee6addc22ae694f28480...
2026-02-02T15:31:56.643104 [FINE] [YamuxStream] [4][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:56.643104 [FINER] [YamuxStream] [4][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:56.643104 [FINE] [YamuxStream] [4][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:56.643104 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:56.643104 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:56.643104 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:56.643104 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:56.643104 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 30 bytes: 001ce004ef80c6aeb2c5965e21373a3e5c295e0456303ae0fe5d22e39fb3
2026-02-02T15:31:56.644103 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c9d680d51d2ec532401c3a174a070ff7885f0...
2026-02-02T15:31:56.644608 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c5941ac69bba74362ee6addc22ae694f284804d4403478a61e9833ce8
2026-02-02T15:31:56.644608 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c5201f01) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.644608 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c5201f01) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 5941ac69bba74362ee6addc22ae694f284804d4403478a61e9833ce8
2026-02-02T15:31:56.644608 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:56.644608 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.644608 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:56.644608 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:56.644608 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:56.644608 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:56.644608 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:56.644608 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(919aadb0) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:56.644608 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(919aadb0) END (from buffer). Returning 28 bytes: 5941ac69bba74362ee6addc22ae694f284804d4403478a61e9833ce8. Buffer after: 0 bytes: 
2026-02-02T15:31:56.645612 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [89, 65, 172, 105]
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 5941ac69bba74362ee6addc22ae694f284804d4403478a61e9833ce8
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5941ac69bba74362ee6addc2
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2ae694f284804d4403478a61e9833ce8
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [89, 65, 172, 105]
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [42, 230, 148, 242]
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [42, 230, 148, 242, 132, 128, 77, 68, 3, 71, 138, 97, 233, 131, 60, 232]
2026-02-02T15:31:56.645612 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.645612 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:56.646614 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:56.646614 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:56.646614 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:56.646614 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.646614 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.646614 [FINER] [YamuxStream] [5][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:56.649611 [FINER] [YamuxStream] [5][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:56.649611 [FINE] [YamuxStream] [5][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:56.650612 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:56.650612 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:56.650612 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:56.650612 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:56.650612 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c84269a2bf27ad64d0f7031405ed27e94ef7d43deea4fdcee2f45ad64
2026-02-02T15:31:56.650612 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c84269a2bf27ad64d0f7031405ed27e94ef7d...
2026-02-02T15:31:56.650612 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:31:56.651611 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:31:56.651611 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067916651-127 for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:56.651611 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:56.651611 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:31:56.651611 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:56.651611 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:31:56.651611 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo already identified on this connection, skipping
2026-02-02T15:31:56.651611 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo (e.g., connection was closed). Identify will not complete.
2026-02-02T15:31:56.651611 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:31:56.651611 [FINE] [YamuxStream] [5][Client] StreamID=3 setDeadline() set to 2026-02-02T15:32:06.651611
2026-02-02T15:31:56.651611 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/test/request/1.0.0] on stream 3...
2026-02-02T15:31:56.652611 [FINE] [YamuxStream] [5][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:56.652611 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:56.652611 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:56.652611 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:56.652611 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:56.652611 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 50 bytes: 003035738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b0912e1fc3c650c98b713d8d5d3b447a815
2026-02-02T15:31:56.652611 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 30 bytes successfully. Data preview (hex): 001ce004ef80c6aeb2c5965e21373a3e5c295e04...
2026-02-02T15:31:56.652611 [FINER] [YamuxStream] [4][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:56.653610 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj on conn 0
2026-02-02T15:31:56.653610 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067916653-3680 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:56.653610 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:56.653610 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:56.653610 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ce004ef80c6aeb2c5965e21373a3e5c295e0456303ae0fe5d22e39fb3
2026-02-02T15:31:56.654610 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.654610 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.654610 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.654610 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.654610 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.654610 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.654610 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.655609 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.656609 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.656609 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(a93a63e6) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:56.656609 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(a93a63e6) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: e004ef80c6aeb2c5965e21373a3e5c295e0456303ae0fe5d22e39fb3
2026-02-02T15:31:56.656609 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:56.656609 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.656609 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:56.656609 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:56.656609 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:56.656609 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:56.656609 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:56.656609 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c859ddf5) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:56.656609 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(c859ddf5) END (from buffer). Returning 28 bytes: e004ef80c6aeb2c5965e21373a3e5c295e0456303ae0fe5d22e39fb3. Buffer after: 0 bytes: 
2026-02-02T15:31:56.656609 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [224, 4, 239, 128]
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e004ef80c6aeb2c5965e21373a3e5c295e0456303ae0fe5d22e39fb3
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e004ef80c6aeb2c5965e2137
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3a3e5c295e0456303ae0fe5d22e39fb3
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [224, 4, 239, 128]
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [58, 62, 92, 41]
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [58, 62, 92, 41, 94, 4, 86, 48, 58, 224, 254, 93, 34, 227, 159, 179]
2026-02-02T15:31:56.657609 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.657609 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:56.658608 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:31:56.658608 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:56.658608 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:56.658608 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.658608 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.658608 [FINER] [YamuxStream] [5][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:56.672605 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (80 bytes): 001c84269a2bf27ad64d0f7031405ed27e94ef7d43deea4fdcee2f45ad64003035738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b0912e1fc3c650c98b713d8d5d3b447a815
2026-02-02T15:31:56.673604 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 50 bytes successfully. Data preview (hex): 003035738a8a9b8fbd9ae54587f8e456725e9d2e...
2026-02-02T15:31:56.673604 [FINE] [YamuxStream] [5][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 20ms
2026-02-02T15:31:56.673604 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:56.674604 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.674604 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.674604 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.674604 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.674604 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.674604 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.675603 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.675603 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.675603 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.675603 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(71d54538) START. Requested: 2. Buffer: 80 bytes.
2026-02-02T15:31:56.675603 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(71d54538) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: 84269a2bf27ad64d0f7031405ed27e94ef7d43deea4fdcee2f45ad64003035738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b0912e1fc3c650c98b713d8d5d3b447a815
2026-02-02T15:31:56.675603 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:56.675603 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.675603 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:56.675603 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:56.675603 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:56.675603 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:56.676602 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:56.676602 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(6fde69c3) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:31:56.676602 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(6fde69c3) END (from buffer). Returning 28 bytes: 84269a2bf27ad64d0f7031405ed27e94ef7d43deea4fdcee2f45ad64. Buffer after: 50 bytes: 003035738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b0912e1fc3c650c98b713d8d5d3b447a815
2026-02-02T15:31:56.676602 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [132, 38, 154, 43]
2026-02-02T15:31:56.676602 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:56.676602 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 84269a2bf27ad64d0f7031405ed27e94ef7d43deea4fdcee2f45ad64
2026-02-02T15:31:56.677174 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:56.677174 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:56.677174 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 84269a2bf27ad64d0f703140
2026-02-02T15:31:56.677174 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5ed27e94ef7d43deea4fdcee2f45ad64
2026-02-02T15:31:56.677174 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [132, 38, 154, 43]
2026-02-02T15:31:56.677174 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [94, 210, 126, 148]
2026-02-02T15:31:56.677174 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [94, 210, 126, 148, 239, 125, 67, 222, 234, 79, 220, 238, 47, 69, 173, 100]
2026-02-02T15:31:56.677174 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.677679 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:56.677679 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:56.677679 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:56.677679 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:56.677679 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.677679 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.677679 [FINER] [YamuxStream] [4][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:56.682676 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.682676 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.682676 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.683675 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.683675 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.683675 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.683675 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.683675 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.683675 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.683675 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d9de69ba) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.683675 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d9de69ba) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.685552 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.685552 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.685552 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.685552 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.685552 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.685552 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.685552 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.685552 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.686564 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.686564 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(6be4130a) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:56.686564 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(6be4130a) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 35738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b0912e1fc3c650c98b713d8d5d3b447a815
2026-02-02T15:31:56.686564 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:56.686564 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.686564 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:56.686564 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:56.686564 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:56.686564 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:56.687564 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:56.687564 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(40909847) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:56.687564 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(40909847) END (from buffer). Returning 48 bytes: 35738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b0912e1fc3c650c98b713d8d5d3b447a815. Buffer after: 0 bytes: 
2026-02-02T15:31:56.687564 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [53, 115, 138, 138]
2026-02-02T15:31:56.687564 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:56.687564 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 35738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b0912e1fc3c650c98b713d8d5d3b447a815
2026-02-02T15:31:56.687564 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:56.688069 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:56.688069 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 35738a8a9b8fbd9ae54587f8e456725e9d2e239c42249f951df2f6a3d1e29b09
2026-02-02T15:31:56.688069 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 12e1fc3c650c98b713d8d5d3b447a815
2026-02-02T15:31:56.688069 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [53, 115, 138, 138]
2026-02-02T15:31:56.688069 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [18, 225, 252, 60]
2026-02-02T15:31:56.688069 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [18, 225, 252, 60, 101, 12, 152, 183, 19, 216, 213, 211, 180, 71, 168, 21]
2026-02-02T15:31:56.688069 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.688069 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:56.689073 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:31:56.689073 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:56.689073 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:56.690073 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.690073 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.690073 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:56.690073 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.690073 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.690073 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.690578 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:56.690578 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:56.690578 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:56.691083 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:56.691083 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.691083 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:56.691083 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:56.691083 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:56.691083 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:56.691083 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:56.691083 [FINE] [YamuxStream] [4][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:56.691083 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:56.692088 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:56.692593 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:56.692593 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:56.692593 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 50 bytes: 00304192ea64051128f3ecab2129596f3b3cca77ff0a0fdeedcba1a2bb996a82969fb3144540a36e3208af7d4943c5bae84f
2026-02-02T15:31:56.692593 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 50 bytes successfully. Data preview (hex): 00304192ea64051128f3ecab2129596f3b3cca77...
2026-02-02T15:31:56.692593 [FINE] [YamuxStream] [4][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:56.692593 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:56.692593 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:56.692593 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:56.693597 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.693597 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.693597 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.693597 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.693597 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.693597 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.694596 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.694596 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.694596 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.694596 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(94fffe0e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.694596 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(94fffe0e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.694596 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00304192ea64051128f3ecab2129596f3b3cca77ff0a0fdeedcba1a2bb996a82969fb3144540a36e3208af7d4943c5bae84f
2026-02-02T15:31:56.695102 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d9de69ba) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.695102 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d9de69ba) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 4192ea64051128f3ecab2129596f3b3cca77ff0a0fdeedcba1a2bb996a82969fb3144540a36e3208af7d4943c5bae84f
2026-02-02T15:31:56.695102 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:56.695102 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.695102 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:56.695102 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:56.695102 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:56.710528 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:56.711043 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:56.711043 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d9dc88bc) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:56.711043 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(d9dc88bc) END (from buffer). Returning 48 bytes: 4192ea64051128f3ecab2129596f3b3cca77ff0a0fdeedcba1a2bb996a82969fb3144540a36e3208af7d4943c5bae84f. Buffer after: 0 bytes: 
2026-02-02T15:31:56.711043 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [65, 146, 234, 100]
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 4192ea64051128f3ecab2129596f3b3cca77ff0a0fdeedcba1a2bb996a82969fb3144540a36e3208af7d4943c5bae84f
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4192ea64051128f3ecab2129596f3b3cca77ff0a0fdeedcba1a2bb996a82969f
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: b3144540a36e3208af7d4943c5bae84f
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [65, 146, 234, 100]
2026-02-02T15:31:56.711043 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [179, 20, 69, 64]
2026-02-02T15:31:56.712059 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [179, 20, 69, 64, 163, 110, 50, 8, 175, 125, 73, 67, 197, 186, 232, 79]
2026-02-02T15:31:56.712059 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.713598 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:56.714113 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:31:56.715117 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:56.715117 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:56.715117 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.715117 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.715623 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:56.716438 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.716438 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.716438 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.717234 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:56.717234 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:56.717234 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:56.717234 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:56.717234 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.717234 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:56.719249 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:56.720755 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:56.720755 [FINE] [YamuxStream] [5][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 21 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:56.720755 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 33, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21, 20, 47, 116, 101, 115, 116, 47, 114])
2026-02-02T15:31:56.732824 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:56.733824 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 49 bytes (plaintext was 33)
2026-02-02T15:31:56.734602 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 51
2026-02-02T15:31:56.734602 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 51 bytes: 00318012ee9141cc01cb48ea516b190b4098b5e2dfa4b93003de71aef4a0dd8f2f96e22961b69e89b71ddca48bcbfe213f1b64
2026-02-02T15:31:56.735427 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 51 bytes successfully. Data preview (hex): 00318012ee9141cc01cb48ea516b190b4098b5e2...
2026-02-02T15:31:56.735427 [FINE] [YamuxStream] [5][Client] StreamID=3 Direct write: Successfully wrote all 21 bytes in 14ms
2026-02-02T15:31:56.735427 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:56.736949 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.756976 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.756976 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.756976 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.756976 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.756976 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.756976 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.756976 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.756976 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.757976 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(03e90b65) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.757976 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(03e90b65) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.760297 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (51 bytes): 00318012ee9141cc01cb48ea516b190b4098b5e2dfa4b93003de71aef4a0dd8f2f96e22961b69e89b71ddca48bcbfe213f1b64
2026-02-02T15:31:56.760297 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(94fffe0e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.761297 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(94fffe0e) END (from buffer). Returning 2 bytes: 0031. Buffer after: 49 bytes: 8012ee9141cc01cb48ea516b190b4098b5e2dfa4b93003de71aef4a0dd8f2f96e22961b69e89b71ddca48bcbfe213f1b64
2026-02-02T15:31:56.761297 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 49]
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 49]
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0031
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 49
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 49
2026-02-02T15:31:56.761297 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 49 more bytes (have 0/49)
2026-02-02T15:31:56.761297 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(43a847bb) START. Requested: 49. Buffer: 49 bytes.
2026-02-02T15:31:56.761297 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(43a847bb) END (from buffer). Returning 49 bytes: 8012ee9141cc01cb48ea516b190b4098b5e2dfa4b93003de71aef4a0dd8f2f96e22961b69e89b71ddca48bcbfe213f1b64. Buffer after: 0 bytes: 
2026-02-02T15:31:56.761297 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 49 bytes. First 4 bytes: [128, 18, 238, 145]
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 49, Got: 49
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 49, Bytes: 8012ee9141cc01cb48ea516b190b4098b5e2dfa4b93003de71aef4a0dd8f2f96e22961b69e89b71ddca48bcbfe213f1b64
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 49
2026-02-02T15:31:56.761297 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(33) and MAC(16)
2026-02-02T15:31:56.763297 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8012ee9141cc01cb48ea516b190b4098b5e2dfa4b93003de71aef4a0dd8f2f96e2
2026-02-02T15:31:56.763297 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2961b69e89b71ddca48bcbfe213f1b64
2026-02-02T15:31:56.763297 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [128, 18, 238, 145]
2026-02-02T15:31:56.763297 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [41, 97, 182, 158]
2026-02-02T15:31:56.764297 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [41, 97, 182, 158, 137, 183, 29, 220, 164, 139, 203, 254, 33, 63, 27, 100]
2026-02-02T15:31:56.764297 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.764297 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:56.764644 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 33 bytes
2026-02-02T15:31:56.764644 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 33 bytes to _decryptedBuffer. New _decryptedBuffer.length: 33
2026-02-02T15:31:56.764644 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 21. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21]
2026-02-02T15:31:56.764644 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.764644 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.764644 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=21
2026-02-02T15:31:56.764644 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.765149 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.765149 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.765149 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=21
2026-02-02T15:31:56.765149 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 21, _decryptedBuffer.length: 21
2026-02-02T15:31:56.765149 [FINER] [SecuredConnection] SecuredConnection.read (length=21): Returning 21 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [20, 47, 116, 101, 115, 116, 47, 114, 101, 113, 117, 101, 115, 116, 47, 49, 46, 48, 46, 48]
2026-02-02T15:31:56.765149 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=21
2026-02-02T15:31:56.765149 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.765149 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 21, flags: 0
2026-02-02T15:31:56.766162 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 21 bytes directly to waiting reader
2026-02-02T15:31:56.766162 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 41
2026-02-02T15:31:56.766162 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/test/request/1.0.0"
2026-02-02T15:31:56.766162 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/test/request/1.0.0"
2026-02-02T15:31:56.766162 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/test/request/1.0.0". Sending acknowledgment: "/test/request/1.0.0".
2026-02-02T15:31:56.766162 [FINE] [YamuxStream] [4][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 21 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:56.766162 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 33, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21, 20, 47, 116, 101, 115, 116, 47, 114])
2026-02-02T15:31:56.766162 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:56.768160 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 49 bytes (plaintext was 33)
2026-02-02T15:31:56.768160 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 51
2026-02-02T15:31:56.768160 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 51 bytes: 00314f229e41d9756268994806d014a4aee42a69620f1765e00cc6e5eb49a332c48c8c44d249e37b3d7aa8b8fa443d6955a30d
2026-02-02T15:31:56.771241 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.772239 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.772239 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.772239 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.772744 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.774748 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.777257 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.777257 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.777257 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.777257 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(8cb604e0) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.777257 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(8cb604e0) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.777911 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (51 bytes): 00314f229e41d9756268994806d014a4aee42a69620f1765e00cc6e5eb49a332c48c8c44d249e37b3d7aa8b8fa443d6955a30d
2026-02-02T15:31:56.777911 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(03e90b65) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.777911 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(03e90b65) END (from buffer). Returning 2 bytes: 0031. Buffer after: 49 bytes: 4f229e41d9756268994806d014a4aee42a69620f1765e00cc6e5eb49a332c48c8c44d249e37b3d7aa8b8fa443d6955a30d
2026-02-02T15:31:56.778600 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 49]
2026-02-02T15:31:56.778600 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.778600 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 49]
2026-02-02T15:31:56.778600 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0031
2026-02-02T15:31:56.779110 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 49
2026-02-02T15:31:56.779110 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 49
2026-02-02T15:31:56.779110 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 49 more bytes (have 0/49)
2026-02-02T15:31:56.779110 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(5baca313) START. Requested: 49. Buffer: 49 bytes.
2026-02-02T15:31:56.779110 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(5baca313) END (from buffer). Returning 49 bytes: 4f229e41d9756268994806d014a4aee42a69620f1765e00cc6e5eb49a332c48c8c44d249e37b3d7aa8b8fa443d6955a30d. Buffer after: 0 bytes: 
2026-02-02T15:31:56.779110 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 49 bytes. First 4 bytes: [79, 34, 158, 65]
2026-02-02T15:31:56.779110 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 49, Got: 49
2026-02-02T15:31:56.779110 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 49, Bytes: 4f229e41d9756268994806d014a4aee42a69620f1765e00cc6e5eb49a332c48c8c44d249e37b3d7aa8b8fa443d6955a30d
2026-02-02T15:31:56.779110 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 49
2026-02-02T15:31:56.779979 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(33) and MAC(16)
2026-02-02T15:31:56.779979 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4f229e41d9756268994806d014a4aee42a69620f1765e00cc6e5eb49a332c48c8c
2026-02-02T15:31:56.779979 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 44d249e37b3d7aa8b8fa443d6955a30d
2026-02-02T15:31:56.779979 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [79, 34, 158, 65]
2026-02-02T15:31:56.779979 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [68, 210, 73, 227]
2026-02-02T15:31:56.779979 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [68, 210, 73, 227, 123, 61, 122, 168, 184, 250, 68, 61, 105, 85, 163, 13]
2026-02-02T15:31:56.780484 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.780484 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:56.780811 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 33 bytes
2026-02-02T15:31:56.780811 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 33 bytes to _decryptedBuffer. New _decryptedBuffer.length: 33
2026-02-02T15:31:56.780811 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 21. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21]
2026-02-02T15:31:56.780811 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.780811 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.785837 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=21
2026-02-02T15:31:56.785837 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.785837 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.785837 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.785837 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=21
2026-02-02T15:31:56.785837 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 21, _decryptedBuffer.length: 21
2026-02-02T15:31:56.786847 [FINER] [SecuredConnection] SecuredConnection.read (length=21): Returning 21 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [20, 47, 116, 101, 115, 116, 47, 114, 101, 113, 117, 101, 115, 116, 47, 49, 46, 48, 46, 48]
2026-02-02T15:31:56.786847 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=21
2026-02-02T15:31:56.786847 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.786847 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 21, flags: 0
2026-02-02T15:31:56.786847 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 21 bytes directly to waiting reader
2026-02-02T15:31:56.787352 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 41
2026-02-02T15:31:56.787352 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /test/request/1.0.0 on stream 3
2026-02-02T15:31:56.787352 [FINE] [YamuxStream] [5][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:31:56.787352 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /test/request/1.0.0 on stream 3...
2026-02-02T15:31:56.787352 [FINE] [StreamScopeImpl] stream-1770067916651-127: Setting protocol to /test/request/1.0.0 for peer 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo
2026-02-02T15:31:56.787352 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/request/1.0.0
2026-02-02T15:31:56.787865 [FINE] [StreamScopeImpl] stream-1770067916651-127: Successfully set protocol to /test/request/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:56.787865 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:31:56.787865 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /test/request/1.0.0
2026-02-02T15:31:56.787865 [FINE] [YamuxStream] [5][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 6 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524247
2026-02-02T15:31:56.787865 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 18, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 6, 5, 72, 101, 108, 108, 111])
2026-02-02T15:31:56.787865 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:56.788876 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 34 bytes (plaintext was 18)
2026-02-02T15:31:56.789877 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 36
2026-02-02T15:31:56.790382 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 36 bytes: 002259f3c0ecf82e6eaf65632fc68080074e28ee942cbc8ddfb7e634c40ee6089ebc1142
2026-02-02T15:31:56.790886 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 36 bytes successfully. Data preview (hex): 002259f3c0ecf82e6eaf65632fc68080074e28ee...
2026-02-02T15:31:56.791889 [FINE] [YamuxStream] [5][Client] StreamID=3 Direct write: Successfully wrote all 6 bytes in 4ms
2026-02-02T15:31:56.792890 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:56.792890 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 51 bytes successfully. Data preview (hex): 00314f229e41d9756268994806d014a4aee42a69...
2026-02-02T15:31:56.793190 [FINE] [YamuxStream] [4][Server] StreamID=3 Direct write: Successfully wrote all 21 bytes in 27ms
2026-02-02T15:31:56.793190 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/test/request/1.0.0".
2026-02-02T15:31:56.793190 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/test/request/1.0.0" and its handler.
2026-02-02T15:31:56.793190 [FINE] [multistream] [multistreamMuxer - handle] Protocol /test/request/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:56.793190 [FINE] [StreamScopeImpl] stream-1770067916653-3680: Setting protocol to /test/request/1.0.0 for peer 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:56.793190 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/request/1.0.0
2026-02-02T15:31:56.793190 [FINE] [StreamScopeImpl] stream-1770067916653-3680: Successfully set protocol to /test/request/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:56.793190 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /test/request/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:56.793190 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:56.794913 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.794913 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.794913 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.794913 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.794913 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.794913 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.794913 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.794913 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.794913 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.796429 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(bfa51ff4) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.796429 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(bfa51ff4) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.796429 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (36 bytes): 002259f3c0ecf82e6eaf65632fc68080074e28ee942cbc8ddfb7e634c40ee6089ebc1142
2026-02-02T15:31:56.796429 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(8cb604e0) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.796429 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(8cb604e0) END (from buffer). Returning 2 bytes: 0022. Buffer after: 34 bytes: 59f3c0ecf82e6eaf65632fc68080074e28ee942cbc8ddfb7e634c40ee6089ebc1142
2026-02-02T15:31:56.796429 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 34]
2026-02-02T15:31:56.796429 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.796429 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 34]
2026-02-02T15:31:56.796429 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0022
2026-02-02T15:31:56.796429 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 34
2026-02-02T15:31:56.796429 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 34
2026-02-02T15:31:56.797949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 34 more bytes (have 0/34)
2026-02-02T15:31:56.797949 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0505f14f) START. Requested: 34. Buffer: 34 bytes.
2026-02-02T15:31:56.797949 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0505f14f) END (from buffer). Returning 34 bytes: 59f3c0ecf82e6eaf65632fc68080074e28ee942cbc8ddfb7e634c40ee6089ebc1142. Buffer after: 0 bytes: 
2026-02-02T15:31:56.797949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 34 bytes. First 4 bytes: [89, 243, 192, 236]
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 34, Got: 34
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 34, Bytes: 59f3c0ecf82e6eaf65632fc68080074e28ee942cbc8ddfb7e634c40ee6089ebc1142
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 34
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(18) and MAC(16)
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 59f3c0ecf82e6eaf65632fc68080074e28ee
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 942cbc8ddfb7e634c40ee6089ebc1142
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [89, 243, 192, 236]
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [148, 44, 188, 141]
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [148, 44, 188, 141, 223, 183, 230, 52, 196, 14, 230, 8, 158, 188, 17, 66]
2026-02-02T15:31:56.797949 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.797949 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:56.798965 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 18 bytes
2026-02-02T15:31:56.799338 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 18 bytes to _decryptedBuffer. New _decryptedBuffer.length: 18
2026-02-02T15:31:56.799338 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 6. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 6]
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=6
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=6
2026-02-02T15:31:56.799338 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 6, _decryptedBuffer.length: 6
2026-02-02T15:31:56.799338 [FINER] [SecuredConnection] SecuredConnection.read (length=6): Returning 6 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [5, 72, 101, 108, 108, 111]
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=6
2026-02-02T15:31:56.799338 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.799338 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 6, flags: 0
2026-02-02T15:31:56.800341 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 6 bytes directly to waiting reader
2026-02-02T15:31:56.800341 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 47
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 5 bytes from queue.
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 5. Returning partial and re-queuing 4 bytes.
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 4 bytes from queue.
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 4. Returning partial and re-queuing 3 bytes.
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 3 bytes from queue.
2026-02-02T15:31:56.800341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 3. Returning partial and re-queuing 2 bytes.
2026-02-02T15:31:56.801341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.801341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:31:56.801341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:31:56.801341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.801341 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:31:56.801847 [FINE] [YamuxStream] [4][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 12 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524247
2026-02-02T15:31:56.801847 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 24, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 12, 11, 69, 99, 104, 111, 58, 32, 72])
2026-02-02T15:31:56.801847 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:31:56.801847 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 40 bytes (plaintext was 24)
2026-02-02T15:31:56.801847 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 42
2026-02-02T15:31:56.801847 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 42 bytes: 00289774832739eada2c58c7b8e3bd132dbda242a80460f0c9e78f78088732001b4caea40260d3dbdd24
2026-02-02T15:31:56.803360 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.803360 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.803360 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.803360 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.803360 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.803360 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.803876 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.803876 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.803876 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.803876 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(d5ef08c1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.803876 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(d5ef08c1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.803876 [FINEST] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - RAW_SOCKET_DATA_CHUNK_RECV (42 bytes): 00289774832739eada2c58c7b8e3bd132dbda242a80460f0c9e78f78088732001b4caea40260d3dbdd24
2026-02-02T15:31:56.803876 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(bfa51ff4) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.803876 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(bfa51ff4) END (from buffer). Returning 2 bytes: 0028. Buffer after: 40 bytes: 9774832739eada2c58c7b8e3bd132dbda242a80460f0c9e78f78088732001b4caea40260d3dbdd24
2026-02-02T15:31:56.803876 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 40]
2026-02-02T15:31:56.804887 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.804887 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 40]
2026-02-02T15:31:56.804887 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0028
2026-02-02T15:31:56.807394 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 40
2026-02-02T15:31:56.808394 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 40
2026-02-02T15:31:56.808394 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 40 more bytes (have 0/40)
2026-02-02T15:31:56.808394 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(078a6526) START. Requested: 40. Buffer: 40 bytes.
2026-02-02T15:31:56.809394 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(078a6526) END (from buffer). Returning 40 bytes: 9774832739eada2c58c7b8e3bd132dbda242a80460f0c9e78f78088732001b4caea40260d3dbdd24. Buffer after: 0 bytes: 
2026-02-02T15:31:56.809394 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 40 bytes. First 4 bytes: [151, 116, 131, 39]
2026-02-02T15:31:56.809394 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 40, Got: 40
2026-02-02T15:31:56.809394 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 40, Bytes: 9774832739eada2c58c7b8e3bd132dbda242a80460f0c9e78f78088732001b4caea40260d3dbdd24
2026-02-02T15:31:56.809394 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 40
2026-02-02T15:31:56.809394 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(24) and MAC(16)
2026-02-02T15:31:56.810393 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9774832739eada2c58c7b8e3bd132dbda242a80460f0c9e7
2026-02-02T15:31:56.810393 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8f78088732001b4caea40260d3dbdd24
2026-02-02T15:31:56.810393 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [151, 116, 131, 39]
2026-02-02T15:31:56.810393 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [143, 120, 8, 135]
2026-02-02T15:31:56.811394 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [143, 120, 8, 135, 50, 0, 27, 76, 174, 164, 2, 96, 211, 219, 221, 36]
2026-02-02T15:31:56.811394 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.812394 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064947538): [163, 124, 232, 140, 255, 229, 244, 89, 219, 28, 78, 184, 203, 157, 2, 122, 112, 98, 232, 54, 244, 90, 196, 230, 157, 145, 240, 163, 247, 166, 89, 223]
2026-02-02T15:31:56.813392 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 24 bytes
2026-02-02T15:31:56.813392 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 24 bytes to _decryptedBuffer. New _decryptedBuffer.length: 24
2026-02-02T15:31:56.814393 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 12. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 12]
2026-02-02T15:31:56.814393 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.814393 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.814393 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.814393 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.814393 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.814393 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.814393 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.814393 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 12
2026-02-02T15:31:56.815391 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [11, 69, 99, 104, 111, 58, 32, 72, 101, 108, 108, 111]
2026-02-02T15:31:56.815391 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.815391 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.815391 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 12, flags: 0
2026-02-02T15:31:56.815391 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 12 bytes directly to waiting reader
2026-02-02T15:31:56.815391 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 53
2026-02-02T15:31:56.816392 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.816392 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 11 bytes from queue.
2026-02-02T15:31:56.816392 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 11. Returning partial and re-queuing 10 bytes.
2026-02-02T15:31:56.816392 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.817392 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 10 bytes from queue.
2026-02-02T15:31:56.817392 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 10. Returning partial and re-queuing 9 bytes.
2026-02-02T15:31:56.817392 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.818391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 9 bytes from queue.
2026-02-02T15:31:56.818391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 9. Returning partial and re-queuing 8 bytes.
2026-02-02T15:31:56.818391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.819391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 8 bytes from queue.
2026-02-02T15:31:56.819391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 8. Returning partial and re-queuing 7 bytes.
2026-02-02T15:31:56.819391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.819391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 7 bytes from queue.
2026-02-02T15:31:56.819391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 7. Returning partial and re-queuing 6 bytes.
2026-02-02T15:31:56.819391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.820390 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 6 bytes from queue.
2026-02-02T15:31:56.820390 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 6. Returning partial and re-queuing 5 bytes.
2026-02-02T15:31:56.820390 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.823391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 5 bytes from queue.
2026-02-02T15:31:56.823391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 5. Returning partial and re-queuing 4 bytes.
2026-02-02T15:31:56.823391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.823391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 4 bytes from queue.
2026-02-02T15:31:56.823391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 4. Returning partial and re-queuing 3 bytes.
2026-02-02T15:31:56.823391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.823391 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 3 bytes from queue.
2026-02-02T15:31:56.824389 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 3. Returning partial and re-queuing 2 bytes.
2026-02-02T15:31:56.824389 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.824389 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:31:56.824389 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:31:56.824389 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:56.824389 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:31:56.824389 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:31:56.824389 [FINE] [YamuxStream] [5][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:31:56.824389 [FINER] [YamuxStream] [5][Client] StreamID=3 Sending pending WINDOW_UPDATE for 53 consumed bytes before local FIN.
2026-02-02T15:31:56.824389 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 53])
2026-02-02T15:31:56.825035 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:31:56.825035 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:56.825035 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:56.825035 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c08cfc8f006ee4e4c6e3d97019955385d6a33e68d36ccd0776d9c5b42
2026-02-02T15:31:56.825540 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c08cfc8f006ee4e4c6e3d97019955385d6a33...
2026-02-02T15:31:56.825540 [FINER] [YamuxStream] [5][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:56.825540 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:56.825540 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:31:56.825540 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:56.825540 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:56.825540 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c833afbc199727ac3e769701943bbb2e2ebc4d935ef6db259d8e16426
2026-02-02T15:31:56.826561 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 42 bytes successfully. Data preview (hex): 00289774832739eada2c58c7b8e3bd132dbda242...
2026-02-02T15:31:56.826561 [FINE] [YamuxStream] [4][Server] StreamID=3 Direct write: Successfully wrote all 12 bytes in 24ms
2026-02-02T15:31:56.827326 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.827326 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.827832 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.827832 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.827832 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.827832 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.827832 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.827832 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.827832 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.827832 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(05ec5957) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.827832 [FINER] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Read(05ec5957) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.828843 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001c08cfc8f006ee4e4c6e3d97019955385d6a33e68d36ccd0776d9c5b42001c833afbc199727ac3e769701943bbb2e2ebc4d935ef6db259d8e16426
2026-02-02T15:31:56.828843 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(d5ef08c1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:56.828843 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(d5ef08c1) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 08cfc8f006ee4e4c6e3d97019955385d6a33e68d36ccd0776d9c5b42001c833afbc199727ac3e769701943bbb2e2ebc4d935ef6db259d8e16426
2026-02-02T15:31:56.829844 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:56.829844 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:56.829844 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(318ebac6) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:31:56.829844 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(318ebac6) END (from buffer). Returning 28 bytes: 08cfc8f006ee4e4c6e3d97019955385d6a33e68d36ccd0776d9c5b42. Buffer after: 30 bytes: 001c833afbc199727ac3e769701943bbb2e2ebc4d935ef6db259d8e16426
2026-02-02T15:31:56.829844 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [8, 207, 200, 240]
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 08cfc8f006ee4e4c6e3d97019955385d6a33e68d36ccd0776d9c5b42
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:56.829844 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 08cfc8f006ee4e4c6e3d9701
2026-02-02T15:31:56.830843 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9955385d6a33e68d36ccd0776d9c5b42
2026-02-02T15:31:56.831148 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [8, 207, 200, 240]
2026-02-02T15:31:56.831148 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [153, 85, 56, 93]
2026-02-02T15:31:56.831148 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [153, 85, 56, 93, 106, 51, 230, 141, 54, 204, 208, 119, 109, 156, 91, 66]
2026-02-02T15:31:56.831148 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.831653 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:56.831653 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:31:56.831653 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:56.831653 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 53]
2026-02-02T15:31:56.831653 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.831653 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.831653 [FINER] [YamuxStream] [4][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 53. Current our send window: 524235, New: 524288
2026-02-02T15:31:56.832656 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c833afbc199727ac3e769701943bbb2e2ebc4...
2026-02-02T15:31:56.832656 [FINER] [YamuxStream] [5][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:31:56.832656 [FINER] [YamuxStream] [5][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:56.832656 [FINER] [YamuxStream] [5][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:56.832656 [FINER] [YamuxStream] [5][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:56.833161 [FINE] [YamuxStream] [5][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:56.833161 [FINE] [YamuxStream] [5][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:56.833161 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:31:56.833161 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:31:56.833161 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:56.833161 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:56.833161 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:56.833161 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:56.833161 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:56.833161 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:56.833161 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:56.833161 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:56.834164 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:56.834164 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:56.834164 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:56.834164 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
01:04 +936 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage getters and basic methods
01:04 +936 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:56.835164 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:56.835164 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:56.835164 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:56.835164 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:56.835669 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:56.835669 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:56.835669 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:56.835669 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:56.835669 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:56.835669 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:56.835669 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.835669 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.835669 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.835669 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.835669 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.835669 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.835669 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.835669 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.835669 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.835669 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(bf7566ac) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:56.836685 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(bf7566ac) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 833afbc199727ac3e769701943bbb2e2ebc4d935ef6db259d8e16426
2026-02-02T15:31:56.836685 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:56.836685 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:56.836685 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7b3a3047) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:56.836685 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(7b3a3047) END (from buffer). Returning 28 bytes: 833afbc199727ac3e769701943bbb2e2ebc4d935ef6db259d8e16426. Buffer after: 0 bytes: 
2026-02-02T15:31:56.836685 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [131, 58, 251, 193]
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 833afbc199727ac3e769701943bbb2e2ebc4d935ef6db259d8e16426
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:56.836685 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 833afbc199727ac3e7697019
2026-02-02T15:31:56.837256 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 43bbb2e2ebc4d935ef6db259d8e16426
2026-02-02T15:31:56.837256 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [131, 58, 251, 193]
2026-02-02T15:31:56.837256 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [67, 187, 178, 226]
2026-02-02T15:31:56.837256 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [67, 187, 178, 226, 235, 196, 217, 53, 239, 109, 178, 89, 216, 225, 100, 38]
2026-02-02T15:31:56.837256 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:56.837256 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:56.837256 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:31:56.837771 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:56.837771 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:56.837771 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:56.837771 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:56.837771 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:56.837771 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:56.837771 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:31:56.838783 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:56.838783 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:56.838783 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:56.838783 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:56.838783 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:56.838783 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:56.838783 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:56.838783 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:56.838783 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:56.839784 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9976a690) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:56.839784 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9976a690) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:56.841296 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:56.841296 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:56.844326 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
01:04 +937 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:04 +937 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:56.848538 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:56.848538 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:56.851044 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:56.851044 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:56.851044 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:56.852559 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:56.854110 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:56.854110 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - Initial _network.listenAddresses: []
2026-02-02T15:31:56.854615 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5, Host hashCode: 583956179
2026-02-02T15:31:56.855120 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:56.855120 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:56.855120 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:56.855120 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:56.855633 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:56.855633 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:57.000881 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:57.000881 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:57.001386 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:57.001386 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:57.001386 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:57.001386 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:57.001386 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:57.001386 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:57.001386 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:57.001386 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:57.001386 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:57.002400 [INFO] [Config] [Config.newNode] for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5: Host created. Listening will be handled by host.start().
2026-02-02T15:31:57.002400 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.002400 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5, network.hashCode: 438655319, initial network.listenAddresses: []
2026-02-02T15:31:57.002400 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:57.002400 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:31:57.002400 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:57.002400 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.002400 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:31:57.002400 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.002400 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.002400 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
01:04 +938 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:04 +939 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:04 +940 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:04 +941 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:04 +942 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:04 +943 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:05 +943 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:57.485450 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58551 for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.485450 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58551
2026-02-02T15:31:57.485450 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58551. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58551] for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.485450 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.485450 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58551 for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:57.485450 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.485450 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58551
2026-02-02T15:31:57.485450 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5.
2026-02-02T15:31:57.485450 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:57.486469 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.486469 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.486469 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.486469 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58551
2026-02-02T15:31:57.486469 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58551
2026-02-02T15:31:57.486469 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.487975 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.487975 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.487975 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.487975 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.487975 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.490498 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - Returning: [/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551]
2026-02-02T15:31:57.500194 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:57.500194 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.500194 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 438655319, network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.502356 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:57.502356 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5, Host hashCode: 583956179
2026-02-02T15:31:57.502356 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.502356 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.502356 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.502356 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.502356 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58551
2026-02-02T15:31:57.503407 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58551
2026-02-02T15:31:57.503407 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.503407 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.503407 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.503407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.503407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.503407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.503407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - Returning: [/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551]
2026-02-02T15:31:57.503407 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.503407 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:57.503407 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:57.503407 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5, Host hashCode: 583956179
2026-02-02T15:31:57.503407 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.503407 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.504407 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.504407 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.504407 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58551
2026-02-02T15:31:57.504407 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58551
2026-02-02T15:31:57.504407 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.504407 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.504407 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.504407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.504407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.504407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.504407 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - Returning: [/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551]
2026-02-02T15:31:57.504407 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.505645 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:57.505645 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:57.505645 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:57.505645 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.505645 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 438655319, network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.505645 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.505645 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 438655319, network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.505645 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.507055 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:57.507561 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5, Host hashCode: 583956179
2026-02-02T15:31:57.507561 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.507561 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.507561 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.507561 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.508074 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58551
2026-02-02T15:31:57.508074 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58551 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58551
2026-02-02T15:31:57.508074 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.508074 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58551 (first component not IP)
2026-02-02T15:31:57.508074 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.508074 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.508074 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.508074 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551}
2026-02-02T15:31:57.508074 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5 - Returning: [/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551]
2026-02-02T15:31:57.508074 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58551, /ip4/172.29.112.1/tcp/58551] for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.509088 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.509088 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.509088 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 438655319, network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.509088 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:57.509088 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.509088 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 438655319, network.listenAddresses: [/ip4/0.0.0.0/tcp/58551]
2026-02-02T15:31:57.509088 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:57.509088 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:57.510086 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWS7UfpPNSRFT3cLj6LPT4m3Cu7ZFpUnieGstw3Sy3rtk5
2026-02-02T15:31:57.510086 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:57.510086 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:57.510591 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:57.510591 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:57.510591 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:57.510591 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:57.511595 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:57.511595 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:57.511595 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:57.512594 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:57.512594 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.512594 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:57.512594 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.515157 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.515157 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.516157 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.516157 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.516157 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 5ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.516157 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.516157 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.517158 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:57.518157 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:57.518157 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:57.518157 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:57.519088 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:57.519088 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.519088 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.519088 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.519088 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.519088 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.520965 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.520965 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.520965 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.520965 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.520965 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:57.520965 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:57.523491 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:57.523491 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:57.523491 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:57.524493 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.524493 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.525490 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.525995 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.525995 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.525995 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.525995 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 5ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.525995 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.525995 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.525995 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:57.526999 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:57.526999 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:57.526999 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:57.526999 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:57.528029 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.528029 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.528029 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.528544 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.528544 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.529059 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.529059 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:190:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.530083 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.530083 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.530083 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2 via protocol /test
2026-02-02T15:31:57.530787 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2, protocols: [/test]
2026-02-02T15:31:57.530787 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2...
2026-02-02T15:31:57.531313 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2, existing_conns=0
2026-02-02T15:31:57.531313 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2"
2026-02-02T15:31:57.531313 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2"
2026-02-02T15:31:57.531313 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2. Dialing.
2026-02-02T15:31:57.531313 [WARNING] [Swarm] Swarm.dialPeer: No addresses found in peerstore for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
2026-02-02T15:31:57.531313 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2 after 0ms: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:796:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      BasicHost.newStream (package:dart_libp2p/p2p/host/basic/basic_host.dart:1216:7)
<asynchronous suspension>
#4      Libp2pRouter.sendMessage (package:dart_ipfs/src/transport/libp2p_router.dart:291:22)
<asynchronous suspension>
#5      Libp2pRouter.broadcastMessage (package:dart_ipfs/src/transport/libp2p_router.dart:386:9)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:193:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.532394 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      BasicHost.newStream (package:dart_libp2p/p2p/host/basic/basic_host.dart:1216:7)
<asynchronous suspension>
#3      Libp2pRouter.sendMessage (package:dart_ipfs/src/transport/libp2p_router.dart:291:22)
<asynchronous suspension>
#4      Libp2pRouter.broadcastMessage (package:dart_ipfs/src/transport/libp2p_router.dart:386:9)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:193:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.532394 [SEVERE] [Libp2pRouter] [ERROR] Failed to send message to 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
Error: Exception: Failed to dial: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
Stack trace: null
2026-02-02T15:31:57.532394 [WARNING] [Libp2pRouter] [WARNING] Failed to broadcast to 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2: Exception: Failed to dial: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
2026-02-02T15:31:57.532394 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:57.532394 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:57.532394 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:57.533401 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:57.533401 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:57.533401 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
01:05 +944 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +944 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:57.533401 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:57.533401 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:57.533401 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:57.533401 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:57.533401 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:57.536587 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:57.536587 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:57.539922 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:57.539922 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:57.541387 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:57.541927 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:57.543938 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.543938 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - Initial _network.listenAddresses: []
2026-02-02T15:31:57.544442 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, Host hashCode: 534853894
2026-02-02T15:31:57.544442 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.544442 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.544442 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.544442 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.545276 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:57.545276 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:57.635329 [FINE] [ambient_autonat_v2] Probe generation 2 cancelled (current: 3)
2026-02-02T15:31:57.635329 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:31:57.637097 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601: ServerSocket closed.
2026-02-02T15:31:57.637097 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4601 connectionStream is done. Removing listener.
2026-02-02T15:31:57.637597 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601 already closed.
2026-02-02T15:31:57.637597 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601: ConnectionController closed.
2026-02-02T15:31:57.637597 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:31:57.637597 [FINE] [YamuxStream] [5][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:57.638102 [FINER] [YamuxStream] [5][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:57.638102 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj
2026-02-02T15:31:57.638102 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:57.638102 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=14
2026-02-02T15:31:57.638102 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:57.638102 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:57.639114 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001c50b577d1be6e4cc6981337be20896677cf33004f73fca1e7b40796ce
2026-02-02T15:31:57.639114 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c50b577d1be6e4cc6981337be20896677cf33004f73fca1e7b40796ce
2026-02-02T15:31:57.640620 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9976a690) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:57.640620 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(9976a690) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 50b577d1be6e4cc6981337be20896677cf33004f73fca1e7b40796ce
2026-02-02T15:31:57.640620 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:57.640620 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:57.640620 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0b27bfce) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:57.640620 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(0b27bfce) END (from buffer). Returning 28 bytes: 50b577d1be6e4cc6981337be20896677cf33004f73fca1e7b40796ce. Buffer after: 0 bytes: 
2026-02-02T15:31:57.640620 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [80, 181, 119, 209]
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 50b577d1be6e4cc6981337be20896677cf33004f73fca1e7b40796ce
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:57.640620 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 50b577d1be6e4cc6981337be
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 20896677cf33004f73fca1e7b40796ce
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [80, 181, 119, 209]
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [32, 137, 102, 119]
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [32, 137, 102, 119, 207, 51, 0, 79, 115, 252, 161, 231, 180, 7, 150, 206]
2026-02-02T15:31:57.641638 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=14 ([0, 0, 0, 0, 14, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:57.641638 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=14, got 12 bytes
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:57.641638 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:57.642638 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:57.642638 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:57.642638 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:57.642638 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:57.642638 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001c50b577d1be6e4cc6981337be20896677cf33...
2026-02-02T15:31:57.642638 [FINER] [YamuxStream] [5][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
2026-02-02T15:31:57.642638 [FINER] [YamuxStream] [5][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:57.642638 [FINER] [YamuxStream] [5][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:57.642638 [FINER] [YamuxStream] [5][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:57.642638 [FINE] [YamuxStream] [5][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:57.642638 [FINE] [YamuxStream] [5][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:57.642638 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:31:57.642638 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:31:57.642638 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:57.642638 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=15
2026-02-02T15:31:57.644142 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:57.644142 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:57.644142 [FINER] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Writing 30 bytes: 001cc9eb6edbaeb59e37e2a383b37bfdaaf50340b17bd4e4288bee2aa5fb
2026-02-02T15:31:57.644142 [FINEST] [TCPConnection] TCPConnection.write (id: 5d47ba38-e79b-4810-a21a-6ae4f382ebb8): Flushed 30 bytes successfully. Data preview (hex): 001cc9eb6edbaeb59e37e2a383b37bfdaaf50340...
2026-02-02T15:31:57.644142 [FINE] [YamuxStream] [5][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:31:57.644142 [FINER] [YamuxStream] [5][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:31:57.644142 [FINE] [YamuxStream] [5][Client] StreamID=3 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:31:57.644142 [FINER] [YamuxStream] [5][Client] StreamID=3 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:31:57.645146 [FINE] [Swarm] AcceptStream loop for conn 0 to 12D3KooWBYXfvQwb2apGGFpeXuSEjB7So7dnzGJWitcGSTSTAvyo terminated due to connection closure.
2026-02-02T15:31:57.645146 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:31:57.645146 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:57.645146 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:57.645651 [FINE] [TCPConnection] TCPConnection(5d47ba38-e79b-4810-a21a-6ae4f382ebb8) - Connection closed.
2026-02-02T15:31:57.645651 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:57.645651 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:57.645651 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:57.646156 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:57.646156 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:57.646156 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:57.646156 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:57.646156 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:57.646156 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:57.646156 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(b7160a0f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:57.646156 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(b7160a0f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:57.646156 [FINEST] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc9eb6edbaeb59e37e2a383b37bfdaaf50340b17bd4e4288bee2aa5fb
2026-02-02T15:31:57.646156 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(b7160a0f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:57.646156 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(b7160a0f) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c9eb6edbaeb59e37e2a383b37bfdaaf50340b17bd4e4288bee2aa5fb
2026-02-02T15:31:57.646156 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:57.646156 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:57.646156 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:57.646156 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:57.647159 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:57.647159 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:57.647159 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:57.647159 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(ef5357dd) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:57.648159 [FINER] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Read(ef5357dd) END (from buffer). Returning 28 bytes: c9eb6edbaeb59e37e2a383b37bfdaaf50340b17bd4e4288bee2aa5fb. Buffer after: 0 bytes: 
2026-02-02T15:31:57.648159 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [201, 235, 110, 219]
2026-02-02T15:31:57.648159 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:57.648159 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c9eb6edbaeb59e37e2a383b37bfdaaf50340b17bd4e4288bee2aa5fb
2026-02-02T15:31:57.648159 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:57.648159 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:57.648159 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c9eb6edbaeb59e37e2a383b3
2026-02-02T15:31:57.649159 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7bfdaaf50340b17bd4e4288bee2aa5fb
2026-02-02T15:31:57.649159 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [201, 235, 110, 219]
2026-02-02T15:31:57.649159 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [123, 253, 170, 245]
2026-02-02T15:31:57.649159 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [123, 253, 170, 245, 3, 64, 177, 123, 212, 228, 40, 139, 238, 42, 165, 251]
2026-02-02T15:31:57.649159 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=15 ([0, 0, 0, 0, 15, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:57.649159 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064099713): [239, 219, 219, 127, 44, 199, 200, 130, 136, 138, 25, 49, 57, 7, 122, 34, 64, 36, 95, 80, 95, 216, 25, 51, 105, 57, 215, 182, 219, 135, 112, 187]
2026-02-02T15:31:57.649159 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=15, got 12 bytes
2026-02-02T15:31:57.649159 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:57.649159 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:31:57.649159 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:57.649159 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:57.650158 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:57.650158 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:31:57.650158 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:57.650158 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:57.650158 [FINER] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Writing 30 bytes: 001cc7226ef8fa3d0808f22d4211ebeb9c6f9c126dea0a8bfa1460a7d91d
2026-02-02T15:31:57.651158 [FINEST] [TCPConnection] TCPConnection.write (id: 2d18be79-086e-485c-9246-ec820603aa58): Flushed 30 bytes successfully. Data preview (hex): 001cc7226ef8fa3d0808f22d4211ebeb9c6f9c12...
2026-02-02T15:31:57.651158 [FINE] [YamuxStream] [4][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:57.651158 [FINER] [YamuxStream] [4][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:57.651158 [FINER] [YamuxStream] [4][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:57.651158 [FINER] [YamuxStream] [4][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:31:57.651158 [FINE] [YamuxStream] [4][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:57.651158 [FINE] [YamuxStream] [4][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:31:57.651158 [FINE] [YamuxStream] [4][Server] StreamID=3 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:31:57.651158 [FINER] [YamuxStream] [4][Server] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:31:57.651158 [FINER] [YamuxStream] [4][Server] StreamID=3 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:31:57.652158 [FINER] [YamuxStream] [4][Server] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:57.652158 [FINE] [YamuxStream] [4][Server] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:31:57.652158 [FINE] [YamuxStream] [4][Server] StreamID=3 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:31:57.652158 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWRfsgwAN4icLybCYpZRFsYMSDU41c3a228dduj1CGXaNj: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:31:57.652158 [FINE] [TCPConnection] TCPConnection(2d18be79-086e-485c-9246-ec820603aa58) - Connection closed.
2026-02-02T15:31:57.676729 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:57.676729 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:57.676729 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:57.676729 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:57.676729 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:57.676729 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:57.676729 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:57.676729 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:57.676729 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:57.676729 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:57.676729 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:57.677733 [INFO] [Config] [Config.newNode] for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz: Host created. Listening will be handled by host.start().
2026-02-02T15:31:57.677733 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.677733 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, network.hashCode: 1051885381, initial network.listenAddresses: []
2026-02-02T15:31:57.677733 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.677733 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4701]. Attempting to listen via _network.listen().
2026-02-02T15:31:57.677733 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.677733 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4701] for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.677733 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.677733 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4701 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.678732 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4701 with transport TCPTransport for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.678732 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4701 with transport TCPTransport
2026-02-02T15:31:57.908079 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4701. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4701 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.909083 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4701 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4701
2026-02-02T15:31:57.909083 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4701. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4701] for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.910082 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.912081 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4701 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:57.912081 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.912081 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4701
2026-02-02T15:31:57.913082 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:57.913082 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.913082 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.913082 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.913082 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.913082 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.913082 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.913082 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:57.914081 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.914081 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.914081 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.914081 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.914081 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:31:57.914081 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:31:57.914081 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.914081 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.914081 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.915082 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.915082 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.915082 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.915082 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:31:57.923145 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:57.924148 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.924148 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 1051885381, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.925652 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:57.926656 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, Host hashCode: 534853894
2026-02-02T15:31:57.926656 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.926656 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.926656 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.927656 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.928656 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:31:57.929660 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:31:57.930659 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.930659 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.930659 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.930659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.930659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.930659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.930659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:31:57.931659 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.931659 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:57.931659 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:57.931659 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, Host hashCode: 534853894
2026-02-02T15:31:57.931659 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.931659 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.931659 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.931659 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.932659 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:31:57.932659 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:31:57.932659 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.932659 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.932659 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.932659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.932659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.932659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.932659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:31:57.933658 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.934658 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:57.934658 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:57.934658 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:57.934658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.934658 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 1051885381, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.934658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.934658 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 1051885381, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.934658 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.935658 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:57.935658 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, Host hashCode: 534853894
2026-02-02T15:31:57.935658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.935658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.935658 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.935658 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.935658 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:31:57.935658 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:31:57.935658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.936657 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:31:57.936657 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.936657 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.936657 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.936657 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:31:57.936657 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:31:57.936657 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701] for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.936657 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.936657 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.936657 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 1051885381, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.937657 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:57.937657 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.937657 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 1051885381, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:31:57.937657 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:57.937657 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:57.937657 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4701 with ID: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:57.937657 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:57.937657 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:57.938657 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:57.939657 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:57.939657 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:57.939657 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:57.940657 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:57.940657 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:57.940657 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:57.940657 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:57.940657 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.940657 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:57.948713 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.953714 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.954714 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.954714 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.954714 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 15ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.954714 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 16ms (dial: 15ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.954714 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.955714 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.955714 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:57.955714 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:57.955714 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:57.955714 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:57.956714 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:57.956714 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.956714 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.957713 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.957713 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.957713 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.957713 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.957713 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.957713 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.957713 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.957713 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:57.958713 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:57.959218 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:57.959218 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:57.959218 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:57.959218 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.959218 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.959218 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.959218 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.959218 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.960221 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.960221 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.960221 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.960221 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.960221 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:57.960221 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:57.961221 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:57.961221 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:57.961221 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:57.961221 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:57.961221 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:57.961221 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:57.961221 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.961221 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.962220 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.962220 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:200:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:57.962220 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:57.962220 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:57.962220 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:57.962220 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:57.965219 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:57.966219 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:57.966219 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:57.967219 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:57.969218 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.969218 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - Initial _network.listenAddresses: []
2026-02-02T15:31:57.969218 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, Host hashCode: 1052429114
2026-02-02T15:31:57.969218 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.969218 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:57.970218 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:57.970218 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:57.970218 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:57.971217 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:31:58.057944 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:31:58.057944 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:31:58.057944 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:31:58.057944 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:31:58.057944 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:31:58.057944 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:31:58.057944 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:31:58.057944 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:31:58.057944 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:31:58.058945 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:31:58.058945 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:31:58.058945 [INFO] [Config] [Config.newNode] for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: Host created. Listening will be handled by host.start().
2026-02-02T15:31:58.058945 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:58.058945 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, network.hashCode: 758866008, initial network.listenAddresses: []
2026-02-02T15:31:58.058945 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.058945 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4702]. Attempting to listen via _network.listen().
2026-02-02T15:31:58.058945 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.058945 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4702] for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.058945 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.058945 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4702 for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.058945 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4702 with transport TCPTransport for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.058945 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4702 with transport TCPTransport
01:05 +945 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +946 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +947 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +948 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +949 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +950 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +951 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +952 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +953 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +954 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +955 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:05 +956 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +956 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:58.333225 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4702. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4702 for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.333225 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4702 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4702
2026-02-02T15:31:58.333225 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4702. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4702] for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.333225 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.334729 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4702 for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. This should be resolved to concrete addresses by the host.
2026-02-02T15:31:58.334729 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.334729 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4702
2026-02-02T15:31:58.334729 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.334729 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335246 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335246 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335246 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335246 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335246 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335246 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:31:58.335760 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335760 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335760 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.335760 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.335760 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:31:58.335760 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:31:58.335760 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.335760 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.335760 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.335760 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.335760 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.335760 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.335760 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:31:58.341348 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:31:58.341348 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.341348 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 758866008, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.341852 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:58.341852 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, Host hashCode: 1052429114
2026-02-02T15:31:58.341852 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.341852 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.341852 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.341852 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.341852 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:31:58.341852 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:31:58.343266 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.343266 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.343266 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.343266 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.343266 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.343266 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.343266 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:31:58.343266 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.343266 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:31:58.343266 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:58.344264 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, Host hashCode: 1052429114
2026-02-02T15:31:58.344264 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.344264 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.344264 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.344789 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.344789 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:31:58.344789 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:31:58.344789 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.344789 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.344789 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.344789 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.346301 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.346301 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.346301 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:31:58.347823 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.348834 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:31:58.348834 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:58.348834 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:31:58.348834 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.348834 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 758866008, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.348834 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.348834 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 758866008, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.348834 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.348834 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:58.348834 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, Host hashCode: 1052429114
2026-02-02T15:31:58.348834 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.348834 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.349841 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.349841 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.349841 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:31:58.349841 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:31:58.349841 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.349841 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.349841 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.349841 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.349841 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.349841 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.349841 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:31:58.349841 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.349841 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.351345 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.351345 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 758866008, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.351345 [FINE] [basichost] HolePunch service started.
2026-02-02T15:31:58.351345 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.351345 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 758866008, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.351345 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:31:58.351345 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:58.351872 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4702 with ID: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.351872 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:31:58.351872 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:58.351872 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:31:58.351872 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:31:58.352916 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:31:58.352916 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:58.352916 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:31:58.352916 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:31:58.352916 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:31:58.352916 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:58.352916 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:58.352916 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:58.352916 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:58.353916 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:58.354419 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.354419 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.354419 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.354419 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.354419 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:58.354419 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.354419 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:31:58.355492 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:31:58.355492 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:58.355492 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:31:58.355492 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:31:58.356004 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:58.356004 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:58.356004 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:58.356004 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.357011 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.357011 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.357011 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.357514 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:58.357514 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.357514 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:31:58.357514 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:31:58.357514 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:58.357514 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:31:58.357514 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:31:58.357514 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:58.357514 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:58.357514 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:58.357514 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.357514 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.358901 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.358901 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.358901 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:58.358901 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.358901 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:31:58.359998 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:31:58.359998 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:58.359998 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:31:58.359998 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:31:58.359998 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:58.359998 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:58.359998 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:31:58.359998 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.359998 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.361501 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.361501 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:201:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:31:58.361501 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:31:58.361501 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:31:58.361501 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/1.0.0
2026-02-02T15:31:58.361501 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4702/p2p/12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.361501 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:31:58.361501 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, Host hashCode: 1052429114
2026-02-02T15:31:58.362695 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.362695 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.362695 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.362695 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.362695 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:31:58.363200 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:31:58.363200 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:31:58.363200 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:31:58.363200 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:58.363827 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.363827 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.363827 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:31:58.363827 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:31:58.363827 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.363827 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, existing_conns=0
2026-02-02T15:31:58.363827 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF"
2026-02-02T15:31:58.363827 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF"
2026-02-02T15:31:58.363827 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Dialing.
2026-02-02T15:31:58.364831 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:31:58.364831 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:31:58.364831 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:31:58.364831 [FINE] [Swarm] Dialing 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:31:58.364831 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:31:58.365937 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4702 (priority 1)
2026-02-02T15:31:58.365937 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF at /ip4/127.0.0.1/tcp/4702
2026-02-02T15:31:58.369052 [FINE] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4702, Socket Remote: 127.0.0.1:58552
2026-02-02T15:31:58.369052 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067918369-2920
2026-02-02T15:31:58.369052 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:58.370347 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a84af62b) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:58.370347 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a84af62b) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:58.381904 [FINE] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58552, Socket Remote: 127.0.0.1:4702
2026-02-02T15:31:58.381904 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067918381-7269
2026-02-02T15:31:58.381904 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWNPEUV8d4uZCSeDnhc6YaTq4B2fjL98gMM5131sh67DH1
2026-02-02T15:31:58.389906 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:58.390906 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:58.390906 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b96cc708) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:58.390906 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b96cc708) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:58.401433 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:58.401433 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a84af62b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.401433 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a84af62b) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:58.401433 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:58.401433 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:58.401433 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:58.402452 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:31:58.402452 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:58.402452 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:58.402452 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(5945212e) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:58.402452 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(5945212e) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:58.402452 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:31:58.402452 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b96cc708) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.402452 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b96cc708) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:31:58.404171 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:58.404171 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:58.404171 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(368f9438) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:31:58.404171 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(368f9438) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:31:58.404171 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:58.404171 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(5945212e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.404171 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(5945212e) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:58.404171 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:31:58.404171 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:31:58.405700 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:31:58.405700 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:31:58.405700 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:31:58.405700 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(368f9438) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.405700 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(368f9438) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:31:58.413170 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:31:58.413170 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 34 bytes: 00206a9fb5b536d28cdf00bf0e859f99feea3c670bb185801bac27b053c3f8a7241f
2026-02-02T15:31:58.414864 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 34 bytes successfully. Data preview (hex): 00206a9fb5b536d28cdf00bf0e859f99feea3c67...
2026-02-02T15:31:58.414864 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(a86184cf) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.414864 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(a86184cf) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.414864 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:31:58.414864 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:31:58.414864 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:31:58.416007 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:58.416007 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:58.418394 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(85cdb268) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.418394 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(85cdb268) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.419452 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 00206a9fb5b536d28cdf00bf0e859f99feea3c670bb185801bac27b053c3f8a7241f
2026-02-02T15:31:58.419452 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(85cdb268) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.419452 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(85cdb268) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 6a9fb5b536d28cdf00bf0e859f99feea3c670bb185801bac27b053c3f8a7241f
2026-02-02T15:31:58.419452 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(8d2aa081) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:31:58.419452 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(8d2aa081) END (from buffer). Returning 32 bytes: 6a9fb5b536d28cdf00bf0e859f99feea3c670bb185801bac27b053c3f8a7241f. Buffer after: 0 bytes: 
2026-02-02T15:31:58.419452 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:31:58.430527 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:31:58.430527 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 202 bytes: 00c81bae66877574fc74b6ae62455a7c3ac1fce0527c11dee7287ae765dd5cf137703547debc919e4a89e732c620a0761a7d5d39395c4b68a7b08b24c801e5021a2007cb9ec6ea9311afa435f4a52352a80f2e93c78899da934f36babf58986c244bbe040a25ffd2af1dba4660e87bac40de7ef52e63a974f3d691e1bab621e106a5f5f091fbb73a8bd133c09f49864ed0bc983663332defd108e1f23f6c72f4bd719cc5125c6177b1b8514ff1cc69b3f86c7438da3bb3edf8b62fed6ad1d74d1cc35d064c165d375efd
2026-02-02T15:31:58.432176 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 202 bytes successfully. Data preview (hex): 00c81bae66877574fc74b6ae62455a7c3ac1fce0...
2026-02-02T15:31:58.432176 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b66c2dec) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.432176 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b66c2dec) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.432176 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c81bae66877574fc74b6ae62455a7c3ac1fce0527c11dee7287ae765dd5cf137703547debc919e4a89e732c620a0761a7d5d39395c4b68a7b08b24c801e5021a2007cb9ec6ea9311afa435f4a52352a80f2e93c78899da934f36babf58986c244bbe040a25ffd2af1dba4660e87bac40de7ef52e63a974f3d691e1bab621e106a5f5f091fbb73a8bd133c09f49864ed0bc983663332defd108e1f23f6c72f4bd719cc5125c6177b1b8514ff1cc69b3f86c7438da3bb3edf8b62fed6ad1d74d1cc35d064c165d375efd
2026-02-02T15:31:58.432176 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(a86184cf) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.432176 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(a86184cf) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 1bae66877574fc74b6ae62455a7c3ac1fce0527c11dee7287ae765dd5cf137703547debc919e4a89e732c620a0761a7d5d39395c4b68a7b08b24c801e5021a2007cb9ec6ea9311afa435f4a52352a80f2e93c78899da934f36babf58986c244bbe040a25ffd2af1dba4660e87bac40de7ef52e63a974f3d691e1bab621e106a5f5f091fbb73a8bd133c09f49864ed0bc983663332defd108e1f23f6c72f4bd719cc5125c6177b1b8514ff1cc69b3f86c7438da3bb3edf8b62fed6ad1d74d1cc35d064c165d375efd
2026-02-02T15:31:58.433260 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(16f45f29) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:31:58.433260 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(16f45f29) END (from buffer). Returning 200 bytes: 1bae66877574fc74b6ae62455a7c3ac1fce0527c11dee7287ae765dd5cf137703547debc919e4a89e732c620a0761a7d5d39395c4b68a7b08b24c801e5021a2007cb9ec6ea9311afa435f4a52352a80f2e93c78899da934f36babf58986c244bbe040a25ffd2af1dba4660e87bac40de7ef52e63a974f3d691e1bab621e106a5f5f091fbb73a8bd133c09f49864ed0bc983663332defd108e1f23f6c72f4bd719cc5125c6177b1b8514ff1cc69b3f86c7438da3bb3edf8b62fed6ad1d74d1cc35d064c165d375efd. Buffer after: 0 bytes: 
2026-02-02T15:31:58.433260 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:31:58.454402 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:31:58.455458 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 170 bytes: 00a809ed09b8298755532943558c9d94f00b85ba19d133a5aac642e44adc352fd8628245b5ec93990bd1de9856e8aee5c9d80c3e8f1266928b474665fdb80504568cef6d975a009ae5628029939d83a59544b501265af0231d3b0b8d84ab30a20864162efd8543b3843967532bf9b5988a43dbb245c18619751c20f21d32dce6e4408f6a3dd0a66784a00ef18f1adac7306dd10ecc6e18abf209e94c8fa4e1d8f18f5c314b65e0945c45
2026-02-02T15:31:58.455458 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 170 bytes successfully. Data preview (hex): 00a809ed09b8298755532943558c9d94f00b85ba...
2026-02-02T15:31:58.455974 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.455974 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:58.455974 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059172674
2026-02-02T15:31:58.455974 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059109959
2026-02-02T15:31:58.455974 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.456988 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.456988 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:58.456988 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:58.457988 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:58.457988 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:58.457988 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 38 bytes: 002454908ed198e493adad21aa839ffecc758c55b8ed2cd0c8aaa836a854b038326b9b7fea8c
2026-02-02T15:31:58.457988 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 38 bytes successfully. Data preview (hex): 002454908ed198e493adad21aa839ffecc758c55...
2026-02-02T15:31:58.457988 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:58.457988 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.457988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.457988 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.459342 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:58.459342 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:58.459342 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.459342 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.459342 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bf1dd416) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.459342 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bf1dd416) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.459342 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (208 bytes): 00a809ed09b8298755532943558c9d94f00b85ba19d133a5aac642e44adc352fd8628245b5ec93990bd1de9856e8aee5c9d80c3e8f1266928b474665fdb80504568cef6d975a009ae5628029939d83a59544b501265af0231d3b0b8d84ab30a20864162efd8543b3843967532bf9b5988a43dbb245c18619751c20f21d32dce6e4408f6a3dd0a66784a00ef18f1adac7306dd10ecc6e18abf209e94c8fa4e1d8f18f5c314b65e0945c45002454908ed198e493adad21aa839ffecc758c55b8ed2cd0c8aaa836a854b038326b9b7fea8c
2026-02-02T15:31:58.459342 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b66c2dec) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.459342 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b66c2dec) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 206 bytes: 09ed09b8298755532943558c9d94f00b85ba19d133a5aac642e44adc352fd8628245b5ec93990bd1de9856e8aee5c9d80c3e8f1266928b474665fdb80504568cef6d975a009ae5628029939d83a59544b501265af0231d3b0b8d84ab30a20864162efd8543b3843967532bf9b5988a43dbb245c18619751c20f21d32dce6e4408f6a3dd0a66784a00ef18f1adac7306dd10ecc6e18abf209e94c8fa4e1d8f18f5c314b65e0945c45002454908ed198e493adad21aa839ffecc758c55b8ed2cd0c8aaa836a854b038326b9b7fea8c
2026-02-02T15:31:58.459342 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(187c5bcf) START. Requested: 168. Buffer: 206 bytes.
2026-02-02T15:31:58.459342 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(187c5bcf) END (from buffer). Returning 168 bytes: 09ed09b8298755532943558c9d94f00b85ba19d133a5aac642e44adc352fd8628245b5ec93990bd1de9856e8aee5c9d80c3e8f1266928b474665fdb80504568cef6d975a009ae5628029939d83a59544b501265af0231d3b0b8d84ab30a20864162efd8543b3843967532bf9b5988a43dbb245c18619751c20f21d32dce6e4408f6a3dd0a66784a00ef18f1adac7306dd10ecc6e18abf209e94c8fa4e1d8f18f5c314b65e0945c45. Buffer after: 38 bytes: 002454908ed198e493adad21aa839ffecc758c55b8ed2cd0c8aaa836a854b038326b9b7fea8c
2026-02-02T15:31:58.459342 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:31:58.469267 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059109959
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059172674
2026-02-02T15:31:58.470408 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.470408 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a599a003) START. Requested: 2. Buffer: 38 bytes.
2026-02-02T15:31:58.470408 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a599a003) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 54908ed198e493adad21aa839ffecc758c55b8ed2cd0c8aaa836a854b038326b9b7fea8c
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:58.470408 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:58.470408 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:58.471879 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ce172fa4) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:58.471879 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ce172fa4) END (from buffer). Returning 36 bytes: 54908ed198e493adad21aa839ffecc758c55b8ed2cd0c8aaa836a854b038326b9b7fea8c. Buffer after: 0 bytes: 
2026-02-02T15:31:58.471879 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [84, 144, 142, 209]
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 54908ed198e493adad21aa839ffecc758c55b8ed2cd0c8aaa836a854b038326b9b7fea8c
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 54908ed198e493adad21aa839ffecc758c55b8ed
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2cd0c8aaa836a854b038326b9b7fea8c
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [84, 144, 142, 209]
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [44, 208, 200, 170]
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [44, 208, 200, 170, 168, 54, 168, 84, 176, 56, 50, 107, 155, 127, 234, 140]
2026-02-02T15:31:58.471879 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.471879 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.472883 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:58.472883 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.472883 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:58.472883 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.472883 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:58.472883 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:58.473899 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:58.473899 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:31:58.473899 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:31:58.473899 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:31:58.473899 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 38 bytes: 00242da54f06a93737e6a2e13c698df07b76d113e18852a9018e6ac2ff8e384607c6fdd1cff7
2026-02-02T15:31:58.473899 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 38 bytes successfully. Data preview (hex): 00242da54f06a93737e6a2e13c698df07b76d113...
2026-02-02T15:31:58.473899 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:58.475404 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:58.475404 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:58.475404 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.475404 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.475404 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.475404 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:58.475404 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:58.475404 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.475404 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.475404 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ed1603e8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.475404 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ed1603e8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.476409 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 00242da54f06a93737e6a2e13c698df07b76d113e18852a9018e6ac2ff8e384607c6fdd1cff7
2026-02-02T15:31:58.476409 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bf1dd416) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.477181 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bf1dd416) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 2da54f06a93737e6a2e13c698df07b76d113e18852a9018e6ac2ff8e384607c6fdd1cff7
2026-02-02T15:31:58.477181 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:31:58.477181 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.477181 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:31:58.477181 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:31:58.477181 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:31:58.477181 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:31:58.477181 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:31:58.477181 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(d00cdbe2) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:31:58.477181 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(d00cdbe2) END (from buffer). Returning 36 bytes: 2da54f06a93737e6a2e13c698df07b76d113e18852a9018e6ac2ff8e384607c6fdd1cff7. Buffer after: 0 bytes: 
2026-02-02T15:31:58.477181 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [45, 165, 79, 6]
2026-02-02T15:31:58.478186 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:31:58.478186 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 2da54f06a93737e6a2e13c698df07b76d113e18852a9018e6ac2ff8e384607c6fdd1cff7
2026-02-02T15:31:58.478186 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:31:58.478186 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:31:58.478186 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2da54f06a93737e6a2e13c698df07b76d113e188
2026-02-02T15:31:58.478186 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 52a9018e6ac2ff8e384607c6fdd1cff7
2026-02-02T15:31:58.478186 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [45, 165, 79, 6]
2026-02-02T15:31:58.485692 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [82, 169, 1, 142]
2026-02-02T15:31:58.486691 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [82, 169, 1, 142, 106, 194, 255, 142, 56, 70, 7, 198, 253, 209, 207, 247]
2026-02-02T15:31:58.486691 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.486691 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.487692 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:31:58.487692 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.487692 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:58.487692 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.488196 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:58.489200 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:58.489200 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:58.490707 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:58.490707 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 32 bytes: 001ee0f51dbce5a44e2e16d0be01c461840d75e0cb83ffb315b5e304f6f7a50d
2026-02-02T15:31:58.491724 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 32 bytes successfully. Data preview (hex): 001ee0f51dbce5a44e2e16d0be01c461840d75e0...
2026-02-02T15:31:58.491724 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:31:58.491724 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.491724 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.491724 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.491724 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:31:58.491724 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:31:58.491724 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.492724 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.492724 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(6fbc5625) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.492724 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(6fbc5625) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.493724 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001ee0f51dbce5a44e2e16d0be01c461840d75e0cb83ffb315b5e304f6f7a50d
2026-02-02T15:31:58.493724 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ed1603e8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.493724 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ed1603e8) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: e0f51dbce5a44e2e16d0be01c461840d75e0cb83ffb315b5e304f6f7a50d
2026-02-02T15:31:58.493724 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:58.493724 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.493724 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:58.493724 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:58.493724 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:58.493724 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:58.493724 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:58.494724 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(6c1e737d) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:58.494724 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(6c1e737d) END (from buffer). Returning 30 bytes: e0f51dbce5a44e2e16d0be01c461840d75e0cb83ffb315b5e304f6f7a50d. Buffer after: 0 bytes: 
2026-02-02T15:31:58.494724 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [224, 245, 29, 188]
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: e0f51dbce5a44e2e16d0be01c461840d75e0cb83ffb315b5e304f6f7a50d
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e0f51dbce5a44e2e16d0be01c461
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 840d75e0cb83ffb315b5e304f6f7a50d
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [224, 245, 29, 188]
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [132, 13, 117, 224]
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [132, 13, 117, 224, 203, 131, 255, 179, 21, 181, 227, 4, 246, 247, 165, 13]
2026-02-02T15:31:58.494724 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.494724 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.495723 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:58.495723 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.495723 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:58.495723 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.495723 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:31:58.495723 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:31:58.495723 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:31:58.495723 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:31:58.495723 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:31:58.496723 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:31:58.496723 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:31:58.496723 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 32 bytes: 001e7ef76ab0a42c8c42d8aff59acd60ad4c941bb5d31b1295c0c38ca1063e79
2026-02-02T15:31:58.496723 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 32 bytes successfully. Data preview (hex): 001e7ef76ab0a42c8c42d8aff59acd60ad4c941b...
2026-02-02T15:31:58.496723 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:31:58.496723 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:31:58.496723 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:58.496723 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:58.497722 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.497722 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067918497-2920
2026-02-02T15:31:58.497722 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.497722 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:58.497722 [FINE] [SwarmConn] SwarmConn (0): Context set: ab268389-821b-4e2b-8102-47edbe659cf0
2026-02-02T15:31:58.497722 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, conn_id=0
2026-02-02T15:31:58.497722 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz": 1
2026-02-02T15:31:58.498722 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:31:58.498722 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.498722 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. Conn ID: 0
2026-02-02T15:31:58.498722 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.498722 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.499228 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.499228 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:31:58.499228 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e7ef76ab0a42c8c42d8aff59acd60ad4c941bb5d31b1295c0c38ca1063e79
2026-02-02T15:31:58.499228 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(6fbc5625) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.499228 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(6fbc5625) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 7ef76ab0a42c8c42d8aff59acd60ad4c941bb5d31b1295c0c38ca1063e79
2026-02-02T15:31:58.499228 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:31:58.499228 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.499228 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:31:58.499228 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:31:58.500232 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:31:58.500232 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(94086811) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:31:58.500232 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(94086811) END (from buffer). Returning 30 bytes: 7ef76ab0a42c8c42d8aff59acd60ad4c941bb5d31b1295c0c38ca1063e79. Buffer after: 0 bytes: 
2026-02-02T15:31:58.500232 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [126, 247, 106, 176]
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 7ef76ab0a42c8c42d8aff59acd60ad4c941bb5d31b1295c0c38ca1063e79
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7ef76ab0a42c8c42d8aff59acd60
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ad4c941bb5d31b1295c0c38ca1063e79
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [126, 247, 106, 176]
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [173, 76, 148, 27]
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [173, 76, 148, 27, 181, 211, 27, 18, 149, 192, 195, 140, 161, 6, 62, 121]
2026-02-02T15:31:58.500232 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.500232 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.501231 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:31:58.501231 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.501231 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:31:58.501231 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.501231 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.501231 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF at /ip4/127.0.0.1/tcp/4702
2026-02-02T15:31:58.502016 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4702
2026-02-02T15:31:58.502016 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.502016 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770067918502-7269
2026-02-02T15:31:58.502016 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.502016 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:31:58.502016 [FINE] [SwarmConn] SwarmConn (0): Context set: 490eef44-5f2a-4f65-9ddf-11a3a46bec5f
2026-02-02T15:31:58.502016 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: 137ms
2026-02-02T15:31:58.502016 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.503022 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.503022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.503022 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.503022 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ad6a6197) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.503022 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ad6a6197) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.503022 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.503022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.503022 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.503022 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.503022 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(2bed10e6) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.503022 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(2bed10e6) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.513894 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:31:58.513894 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.513894 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Conn ID: 0
2026-02-02T15:31:58.513894 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.513894 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.513894 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:31:58.513894 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Context HashCode: 937315977
2026-02-02T15:31:58.513894 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:58.513894 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:58.513894 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:58.514898 [FINE] [YamuxStream] [7][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:58.515402 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.515402 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:58.515402 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:58.515402 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Conn ID: 0
2026-02-02T15:31:58.515402 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:58.515402 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:58.515402 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 30 bytes: 001c25078c6d1d6eabf2b588c5a1ec2b38dc123517d9060eea69883cf043
2026-02-02T15:31:58.515402 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 30 bytes successfully. Data preview (hex): 001c25078c6d1d6eabf2b588c5a1ec2b38dc1235...
2026-02-02T15:31:58.515402 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c25078c6d1d6eabf2b588c5a1ec2b38dc123517d9060eea69883cf043
2026-02-02T15:31:58.515402 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ad6a6197) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.515402 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ad6a6197) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 25078c6d1d6eabf2b588c5a1ec2b38dc123517d9060eea69883cf043
2026-02-02T15:31:58.516796 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:58.516796 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:58.516796 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(7b127bd0) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:58.516796 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(7b127bd0) END (from buffer). Returning 28 bytes: 25078c6d1d6eabf2b588c5a1ec2b38dc123517d9060eea69883cf043. Buffer after: 0 bytes: 
2026-02-02T15:31:58.516796 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [37, 7, 140, 109]
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 25078c6d1d6eabf2b588c5a1ec2b38dc123517d9060eea69883cf043
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 25078c6d1d6eabf2b588c5a1
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ec2b38dc123517d9060eea69883cf043
2026-02-02T15:31:58.516796 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [37, 7, 140, 109]
2026-02-02T15:31:58.517794 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [236, 43, 56, 220]
2026-02-02T15:31:58.517794 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [236, 43, 56, 220, 18, 53, 23, 217, 6, 14, 234, 105, 136, 60, 240, 67]
2026-02-02T15:31:58.517794 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.517794 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.517794 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:58.517794 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:58.517794 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:58.517794 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.517794 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.517794 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:58.517794 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:31:58.518794 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:58.518794 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:58.518794 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 30 bytes: 001c1a61969d820b65bba7ee0b7c9400cce1d15c422aeacd47976f6c3346
2026-02-02T15:31:58.518794 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c1a61969d820b65bba7ee0b7c9400cce1d15c422aeacd47976f6c3346
2026-02-02T15:31:58.518794 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(2bed10e6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.518794 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(2bed10e6) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 1a61969d820b65bba7ee0b7c9400cce1d15c422aeacd47976f6c3346
2026-02-02T15:31:58.518794 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:58.518794 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.518794 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:58.518794 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:58.518794 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:58.519795 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:58.519795 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b07395ad) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:58.519795 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b07395ad) END (from buffer). Returning 28 bytes: 1a61969d820b65bba7ee0b7c9400cce1d15c422aeacd47976f6c3346. Buffer after: 0 bytes: 
2026-02-02T15:31:58.519795 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [26, 97, 150, 157]
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1a61969d820b65bba7ee0b7c9400cce1d15c422aeacd47976f6c3346
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1a61969d820b65bba7ee0b7c
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9400cce1d15c422aeacd47976f6c3346
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [26, 97, 150, 157]
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [148, 0, 204, 225]
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [148, 0, 204, 225, 209, 92, 66, 42, 234, 205, 71, 151, 111, 108, 51, 70]
2026-02-02T15:31:58.519795 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.519795 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.520794 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:31:58.520794 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:58.520794 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:58.520794 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.520794 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.520794 [FINER] [YamuxStream] [7][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:58.520794 [FINER] [YamuxStream] [7][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:58.520794 [FINE] [YamuxStream] [7][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:58.520794 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:58.520794 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:58.520794 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:58.520794 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:58.520794 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 30 bytes: 001cc6dc2d74f0332dd29f2a31c986fd942882dcee495a29330eab9f5185
2026-02-02T15:31:58.520794 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 30 bytes successfully. Data preview (hex): 001c1a61969d820b65bba7ee0b7c9400cce1d15c...
2026-02-02T15:31:58.522299 [FINE] [YamuxStream] [6][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:58.522299 [FINER] [YamuxStream] [6][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:58.522299 [FINE] [YamuxStream] [6][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:58.522299 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:31:58.522299 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:31:58.522299 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:58.522299 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:58.522299 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 30 bytes: 001c9e165f0777c9d3d432ef3f10c407f55dd79b8b0e73956990dd0c46b1
2026-02-02T15:31:58.523318 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 30 bytes successfully. Data preview (hex): 001c9e165f0777c9d3d432ef3f10c407f55dd79b...
2026-02-02T15:31:58.523318 [FINER] [YamuxStream] [6][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:58.523318 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz on conn 0
2026-02-02T15:31:58.523318 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067918523-6944 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.524318 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:58.524318 [FINEST] [YamuxStream] [6][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:58.524318 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.524318 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.524825 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.524825 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.524825 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.524825 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.524825 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.524825 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.524825 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.524825 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(9aaf37b2) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.524825 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(9aaf37b2) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.524825 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc6dc2d74f0332dd29f2a31c986fd942882dcee495a29330eab9f5185
2026-02-02T15:31:58.524825 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 30 bytes successfully. Data preview (hex): 001cc6dc2d74f0332dd29f2a31c986fd942882dc...
2026-02-02T15:31:58.524825 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:31:58.524825 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:31:58.525829 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067918524-5926 for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.525829 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:58.525829 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:31:58.525829 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, stream_id=1, protocol=/ipfs/id/1.0.0, duration=11ms
2026-02-02T15:31:58.525829 [FINE] [YamuxStream] [7][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:28.525829
2026-02-02T15:31:58.525829 [FINE] [YamuxStream] [7][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:58.525829 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.526516 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:31:58.526516 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:58.526516 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:58.526516 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:58.526516 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:58.526516 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 50 bytes: 00307f8204dc5528988a171108c7798e00fe92dbe591d7e5c677830692143105f312c61c279d8d08c1ca7276e8c74a0608d3
2026-02-02T15:31:58.526516 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c9e165f0777c9d3d432ef3f10c407f55dd79b8b0e73956990dd0c46b1
2026-02-02T15:31:58.526516 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(9aaf37b2) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.526516 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(9aaf37b2) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 9e165f0777c9d3d432ef3f10c407f55dd79b8b0e73956990dd0c46b1
2026-02-02T15:31:58.526516 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:58.527757 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.527757 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:58.527757 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:58.527757 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:58.527757 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:58.527757 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:58.527757 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(6b09890f) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:58.527757 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(6b09890f) END (from buffer). Returning 28 bytes: 9e165f0777c9d3d432ef3f10c407f55dd79b8b0e73956990dd0c46b1. Buffer after: 0 bytes: 
2026-02-02T15:31:58.527757 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [158, 22, 95, 7]
2026-02-02T15:31:58.528262 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:58.528262 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 9e165f0777c9d3d432ef3f10c407f55dd79b8b0e73956990dd0c46b1
2026-02-02T15:31:58.528262 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:58.528262 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:58.528775 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9e165f0777c9d3d432ef3f10
2026-02-02T15:31:58.528775 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c407f55dd79b8b0e73956990dd0c46b1
2026-02-02T15:31:58.528775 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [158, 22, 95, 7]
2026-02-02T15:31:58.528775 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [196, 7, 245, 93]
2026-02-02T15:31:58.528775 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [196, 7, 245, 93, 215, 155, 139, 14, 115, 149, 105, 144, 221, 12, 70, 177]
2026-02-02T15:31:58.528775 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.529287 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.529287 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:58.529287 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:58.529287 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:58.529287 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.529287 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.529287 [FINER] [YamuxStream] [7][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:58.530332 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.530332 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.530332 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.530332 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.530332 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.530332 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.530332 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.530332 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.530332 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.530332 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(433b42da) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:58.530332 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(433b42da) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c6dc2d74f0332dd29f2a31c986fd942882dcee495a29330eab9f5185
2026-02-02T15:31:58.530332 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:58.530332 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:58.531334 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:58.531334 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(aa6912ca) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:58.531334 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(aa6912ca) END (from buffer). Returning 28 bytes: c6dc2d74f0332dd29f2a31c986fd942882dcee495a29330eab9f5185. Buffer after: 0 bytes: 
2026-02-02T15:31:58.531334 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [198, 220, 45, 116]
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c6dc2d74f0332dd29f2a31c986fd942882dcee495a29330eab9f5185
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c6dc2d74f0332dd29f2a31c9
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 86fd942882dcee495a29330eab9f5185
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [198, 220, 45, 116]
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [134, 253, 148, 40]
2026-02-02T15:31:58.531334 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [134, 253, 148, 40, 130, 220, 238, 73, 90, 41, 51, 14, 171, 159, 81, 133]
2026-02-02T15:31:58.532758 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.533263 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.533263 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:31:58.533263 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:58.533263 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:31:58.533263 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.533263 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.533263 [FINER] [YamuxStream] [6][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:58.533263 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00307f8204dc5528988a171108c7798e00fe92dbe591d7e5c677830692143105f312c61c279d8d08c1ca7276e8c74a0608d3
2026-02-02T15:31:58.533263 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 50 bytes successfully. Data preview (hex): 00307f8204dc5528988a171108c7798e00fe92db...
2026-02-02T15:31:58.533263 [FINE] [YamuxStream] [7][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 7ms
2026-02-02T15:31:58.533263 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:58.533263 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.533263 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.534776 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.534776 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.534776 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.534776 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.534776 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.534776 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.534776 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.534776 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(8fd8b35e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.534776 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(8fd8b35e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.535291 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(aeeff828) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:58.535291 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(aeeff828) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 7f8204dc5528988a171108c7798e00fe92dbe591d7e5c677830692143105f312c61c279d8d08c1ca7276e8c74a0608d3
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:58.535291 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:58.535291 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(5648e4f1) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:58.535291 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(5648e4f1) END (from buffer). Returning 48 bytes: 7f8204dc5528988a171108c7798e00fe92dbe591d7e5c677830692143105f312c61c279d8d08c1ca7276e8c74a0608d3. Buffer after: 0 bytes: 
2026-02-02T15:31:58.535291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [127, 130, 4, 220]
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 7f8204dc5528988a171108c7798e00fe92dbe591d7e5c677830692143105f312c61c279d8d08c1ca7276e8c74a0608d3
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7f8204dc5528988a171108c7798e00fe92dbe591d7e5c677830692143105f312
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c61c279d8d08c1ca7276e8c74a0608d3
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [127, 130, 4, 220]
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [198, 28, 39, 157]
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [198, 28, 39, 157, 141, 8, 193, 202, 114, 118, 232, 199, 74, 6, 8, 211]
2026-02-02T15:31:58.536509 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.536509 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:58.536509 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:58.537509 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:58.537509 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.537509 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:58.538012 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.538012 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:58.538012 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:58.538012 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:58.538012 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:58.538012 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:58.538012 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:58.538012 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:58.538012 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:31:58.538012 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:58.538012 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:58.538012 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 50 bytes: 00307d4e52f9c0df2896fd709a54e8b8571139763bd0d7d00248f5c61be85b5d16a875fb9c27d343ca88e6f5e9288210b945
2026-02-02T15:31:58.539174 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 50 bytes successfully. Data preview (hex): 00307d4e52f9c0df2896fd709a54e8b857113976...
2026-02-02T15:31:58.539174 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:58.539174 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:58.539174 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:58.539678 [FINEST] [YamuxStream] [6][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:58.539678 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.539678 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.539678 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.539678 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.539678 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.539678 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.539678 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.539678 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.539678 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.539678 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(652ac236) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.539678 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(652ac236) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.541189 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00307d4e52f9c0df2896fd709a54e8b8571139763bd0d7d00248f5c61be85b5d16a875fb9c27d343ca88e6f5e9288210b945
2026-02-02T15:31:58.541189 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(8fd8b35e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.541189 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(8fd8b35e) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 7d4e52f9c0df2896fd709a54e8b8571139763bd0d7d00248f5c61be85b5d16a875fb9c27d343ca88e6f5e9288210b945
2026-02-02T15:31:58.541189 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:58.541189 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:58.541189 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(30c655c9) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:58.541189 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(30c655c9) END (from buffer). Returning 48 bytes: 7d4e52f9c0df2896fd709a54e8b8571139763bd0d7d00248f5c61be85b5d16a875fb9c27d343ca88e6f5e9288210b945. Buffer after: 0 bytes: 
2026-02-02T15:31:58.541189 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [125, 78, 82, 249]
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 7d4e52f9c0df2896fd709a54e8b8571139763bd0d7d00248f5c61be85b5d16a875fb9c27d343ca88e6f5e9288210b945
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7d4e52f9c0df2896fd709a54e8b8571139763bd0d7d00248f5c61be85b5d16a8
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 75fb9c27d343ca88e6f5e9288210b945
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [125, 78, 82, 249]
2026-02-02T15:31:58.541189 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [117, 251, 156, 39]
2026-02-02T15:31:58.542706 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [117, 251, 156, 39, 211, 67, 202, 136, 230, 245, 233, 40, 130, 16, 185, 69]
2026-02-02T15:31:58.542706 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.542706 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.542706 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:31:58.543221 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:58.543221 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:58.543221 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:58.543221 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:58.543221 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.543221 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:58.543221 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:58.543221 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:58.544225 [FINE] [YamuxStream] [7][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:58.544225 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:58.544225 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:58.544729 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:58.544729 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:58.544729 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 46 bytes: 002c6c95a4f6e92c250de5f0ab5d97eb499da040002c32b70fe85ff13c1e888b21a64b5d52d6db18a8e46c6341d3
2026-02-02T15:31:58.544729 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 46 bytes successfully. Data preview (hex): 002c6c95a4f6e92c250de5f0ab5d97eb499da040...
2026-02-02T15:31:58.545273 [FINE] [YamuxStream] [7][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:31:58.545273 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:58.545273 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.545273 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.545273 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.545273 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.545273 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.545786 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.545786 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(dec14adb) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.545786 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(dec14adb) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.545786 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c6c95a4f6e92c250de5f0ab5d97eb499da040002c32b70fe85ff13c1e888b21a64b5d52d6db18a8e46c6341d3
2026-02-02T15:31:58.545786 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(652ac236) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.545786 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(652ac236) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 6c95a4f6e92c250de5f0ab5d97eb499da040002c32b70fe85ff13c1e888b21a64b5d52d6db18a8e46c6341d3
2026-02-02T15:31:58.545786 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:58.545786 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:58.546797 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(db627f0f) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:58.546797 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(db627f0f) END (from buffer). Returning 44 bytes: 6c95a4f6e92c250de5f0ab5d97eb499da040002c32b70fe85ff13c1e888b21a64b5d52d6db18a8e46c6341d3. Buffer after: 0 bytes: 
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [108, 149, 164, 246]
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 6c95a4f6e92c250de5f0ab5d97eb499da040002c32b70fe85ff13c1e888b21a64b5d52d6db18a8e46c6341d3
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 6c95a4f6e92c250de5f0ab5d97eb499da040002c32b70fe85ff13c1e
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 888b21a64b5d52d6db18a8e46c6341d3
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [108, 149, 164, 246]
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [136, 139, 33, 166]
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [136, 139, 33, 166, 75, 93, 82, 214, 219, 24, 168, 228, 108, 99, 65, 211]
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.546797 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:58.546797 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:58.547797 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.547797 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:58.547797 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.547797 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:58.547797 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:58.547797 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:58.547797 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:31:58.547797 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:31:58.547797 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:31:58.547797 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:58.548302 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:31:58.548302 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:31:58.548302 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:31:58.548302 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:31:58.548302 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 46 bytes: 002cd0b7a05f0d4b45ae26a767b62d9e267440a61815f1e710e22a01f751520e243ae6f37b86b53a411345b1c3f2
2026-02-02T15:31:58.548302 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.548302 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.548302 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.548302 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.548302 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.548302 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.548302 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.548302 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.548302 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.548302 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(42dcae9d) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.548302 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(42dcae9d) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.548302 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002cd0b7a05f0d4b45ae26a767b62d9e267440a61815f1e710e22a01f751520e243ae6f37b86b53a411345b1c3f2
2026-02-02T15:31:58.549305 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(dec14adb) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.549305 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(dec14adb) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: d0b7a05f0d4b45ae26a767b62d9e267440a61815f1e710e22a01f751520e243ae6f37b86b53a411345b1c3f2
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:31:58.549305 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b3f6862b) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:31:58.549305 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(b3f6862b) END (from buffer). Returning 44 bytes: d0b7a05f0d4b45ae26a767b62d9e267440a61815f1e710e22a01f751520e243ae6f37b86b53a411345b1c3f2. Buffer after: 0 bytes: 
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [208, 183, 160, 95]
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: d0b7a05f0d4b45ae26a767b62d9e267440a61815f1e710e22a01f751520e243ae6f37b86b53a411345b1c3f2
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d0b7a05f0d4b45ae26a767b62d9e267440a61815f1e710e22a01f751
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 520e243ae6f37b86b53a411345b1c3f2
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [208, 183, 160, 95]
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [82, 14, 36, 58]
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [82, 14, 36, 58, 230, 243, 123, 134, 181, 58, 65, 19, 69, 177, 195, 242]
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:31:58.549305 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:31:58.549305 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.549305 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:31:58.549305 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:31:58.549305 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:31:58.549305 [FINE] [YamuxStream] [7][Client] StreamID=1 setDeadline() set to 2026-02-02T15:32:28.549305
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918524-5926: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.550809 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918524-5926: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:58.550809 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918524-5926: Setting service to libp2p.identify for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, protocol /ipfs/id/1.0.0
2026-02-02T15:31:58.550809 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918524-5926: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:58.550809 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:58.550809 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 46 bytes successfully. Data preview (hex): 002cd0b7a05f0d4b45ae26a767b62d9e267440a6...
2026-02-02T15:31:58.550809 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 2ms
2026-02-02T15:31:58.550809 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:31:58.550809 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:31:58.550809 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918523-6944: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.550809 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918523-6944: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:58.550809 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:58.550809 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz (reported as 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz) on stream 1
2026-02-02T15:31:58.550809 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. IsPush: false. Stream ID: 1
2026-02-02T15:31:58.550809 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. IsPush: false. Stream ID: 1
2026-02-02T15:31:58.550809 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918523-6944: Setting service to libp2p.identify for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, protocol /ipfs/id/1.0.0
2026-02-02T15:31:58.550809 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:31:58.550809 [FINE] [StreamScopeImpl] stream-1770067918523-6944: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:31:58.550809 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.550809 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz: seq=4, protocols=7, addrs=2
2026-02-02T15:31:58.550809 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. Snapshot seq: 4
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58552 for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4702, RemoteAddr: /ip4/127.0.0.1/tcp/58552, ViaLoopback: true for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.552327 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58552)
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. Total message size: 427 bytes. SignedPeerRecord present: true
2026-02-02T15:31:58.552327 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 427).
2026-02-02T15:31:58.553924 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 429 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:31:58.553924 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 441, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 173, 171, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:31:58.553924 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:58.553924 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 457 bytes (plaintext was 441)
2026-02-02T15:31:58.553924 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 459
2026-02-02T15:31:58.553924 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 459 bytes: 01c9258c58f626325b590c7c5fe766ca58dd4cc64baf0be2c7a9d15dbbae9e44b84c60416f76bd2d9a130cfa87601d320f4b1bb4a0322a49466ad09f5861f440f8ea7f8dcce117ca67877492da7a27170c2fbb6db9e0b68690e3568e9697928624a74e6497a6f76220ebb419fb3357a9a968519e237972d8ef657a9b28a2d2e92befc07103f93806eca46c08206daf52c9e50394f8db26d30d339548f597ff8d39a7f3204e825ee4a20db705b0270c52139441052a22980ecd6dfc3828e8e2fccd58ab248e2246f1ff354ce87150ecdf57ca3830cb30403d4a2c8887956dfb6f2274dc08ecad6d9ac3355437d5c40cb789a4facaa35064177132f540160e777ccddfd10c92d74fb8eb1fb91c0b6f9e1f4461c2651933eddd48c06338ecc4f71983bf80f261da4ccb07081f7e5b979ff4dd8db4861f14a5f964bcbd177512ea00b432fcad6ffa83e1bf736f76c714c19a37a48261249d9221e5126f9e3d80358040c8dbee57ba0bb669bd56ea36153d3d6b3ab8b1a4716187890e143f3cfafb7c52de7c91800f9c8cd5e24ae13858440e7abc9e3f12b4529f7d5f1d0e50f15186b57ac6ceaac0e13fc91d14173c3aa41a5bc3e432a51d4bf6256a5df3c4f99f07c76e959ef520e9f835dd3c
2026-02-02T15:31:58.554490 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.554490 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.554490 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.554490 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.554490 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.554490 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.554490 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.554490 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.554490 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.554490 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(52ba6f9f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.554490 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(52ba6f9f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.554490 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (459 bytes): 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
2026-02-02T15:31:58.554490 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(52ba6f9f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.554490 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(52ba6f9f) END (from buffer). Returning 2 bytes: 01c9. Buffer after: 457 bytes: 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
2026-02-02T15:31:58.555497 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 201]
2026-02-02T15:31:58.555497 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.555497 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 201]
2026-02-02T15:31:58.555497 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01c9
2026-02-02T15:31:58.555497 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 457
2026-02-02T15:31:58.555497 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 457
2026-02-02T15:31:58.555497 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 457 more bytes (have 0/457)
2026-02-02T15:31:58.555497 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(d13bd861) START. Requested: 457. Buffer: 457 bytes.
2026-02-02T15:31:58.555497 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(d13bd861) END (from buffer). Returning 457 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:31:58.555497 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 457 bytes. First 4 bytes: [37, 140, 88, 246]
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 457, Got: 457
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 457, Bytes: 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
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 457
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(441) and MAC(16)
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f3c4f99f07c76e959ef520e9f835dd3c
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [37, 140, 88, 246]
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [243, 196, 249, 159]
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [243, 196, 249, 159, 7, 199, 110, 149, 158, 245, 32, 233, 248, 53, 221, 60]
2026-02-02T15:31:58.556013 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.556013 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.557016 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 441 bytes
2026-02-02T15:31:58.557016 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 441 bytes to _decryptedBuffer. New _decryptedBuffer.length: 441
2026-02-02T15:31:58.557016 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 429. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 173]
2026-02-02T15:31:58.557016 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.557016 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.557522 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=429
2026-02-02T15:31:58.557522 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.557522 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.557522 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.557522 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=429
2026-02-02T15:31:58.557522 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 429, _decryptedBuffer.length: 429
2026-02-02T15:31:58.557522 [FINER] [SecuredConnection] SecuredConnection.read (length=429): Returning 429 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [171, 3, 10, 36, 8, 1, 18, 32, 72, 172, 208, 70, 48, 34, 240, 168, 137, 250, 130, 56]
2026-02-02T15:31:58.557522 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=429
2026-02-02T15:31:58.557522 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.557522 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 429, flags: 0
2026-02-02T15:31:58.557522 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 429 bytes directly to waiting reader
2026-02-02T15:31:58.557522 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 465
2026-02-02T15:31:58.557522 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, 427 bytes, duration=6ms
2026-02-02T15:31:58.558538 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. IsPush: false.
2026-02-02T15:31:58.558538 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: 0
2026-02-02T15:31:58.558538 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: 7
2026-02-02T15:31:58.558538 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
2026-02-02T15:31:58.558538 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:31:58.558538 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF - Added protocols: 7, Removed protocols: 0
2026-02-02T15:31:58.558538 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: /ip4/127.0.0.1/tcp/58552
2026-02-02T15:31:58.559536 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58552 for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF via conn 0.
2026-02-02T15:31:58.559536 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.559536 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.559536 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF (181 bytes).
2026-02-02T15:31:58.559536 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:31:58.559536 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:31:58.567159 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:31:58.567159 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: true
2026-02-02T15:31:58.567159 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF from record public key for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.568196 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Found 2 addresses.
2026-02-02T15:31:58.568196 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: 2
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF based on remote connection address /ip4/127.0.0.1/tcp/4702. Before filter: 2
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4702 (Loopback: true, Private: false, Public: false)
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: 2
2026-02-02T15:31:58.568196 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:31:58.568196 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.569437 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:31:58.569437 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.569437 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF from local peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.569437 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.569437 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.569437 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF from received public key for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.569437 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF matches expected remote peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.569437 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Comparing with received key.
2026-02-02T15:31:58.569437 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF matches existing key in peerstore.
2026-02-02T15:31:58.570518 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:58.570518 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF in peerstore.
2026-02-02T15:31:58.570518 [FINE] [autonatv2] Peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF identification completed, updating peer map
2026-02-02T15:31:58.570518 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF supports push.
2026-02-02T15:31:58.570518 [FINER] [YamuxStream] [7][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:58.570518 [FINER] [YamuxStream] [7][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:58.570518 [FINE] [autonatv2] Updating peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF: protocols=[/ipfs/1.0.0, /ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:31:58.570518 [FINE] [autonatv2] Adding peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:31:58.571519 [FINE] [ambient_autonat_v2] Peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF supports AutoNAT v2, scheduling probe
2026-02-02T15:31:58.571519 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:31:58.571519 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:58.571519 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:31:58.571519 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:58.571519 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:58.571519 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 30 bytes: 001c511ed6ec9d3896a53a93cc4e20363be23faf324131acbc0d1399a9a4
2026-02-02T15:31:58.571519 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 459 bytes successfully. Data preview (hex): 01c9258c58f626325b590c7c5fe766ca58dd4cc6...
2026-02-02T15:31:58.571519 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 429 bytes in 17ms
2026-02-02T15:31:58.572519 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.572519 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.572519 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.572519 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz to 4.
2026-02-02T15:31:58.572519 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz.
2026-02-02T15:31:58.573023 [FINER] [YamuxStream] [6][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:31:58.573023 [FINER] [YamuxStream] [6][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:31:58.573023 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:31:58.573023 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:58.573023 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:58.573023 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:58.573023 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 30 bytes: 001c208f5ab40fddee098cac0f662d9e519c9891d0301760678a73653e2f
2026-02-02T15:31:58.574027 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 30 bytes successfully. Data preview (hex): 001c208f5ab40fddee098cac0f662d9e519c9891...
2026-02-02T15:31:58.574027 [FINE] [YamuxStream] [6][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:58.574027 [FINE] [YamuxStream] [6][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:58.574027 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:31:58.574027 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz. IsPush: false.
2026-02-02T15:31:58.574027 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.574027 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.574027 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.574027 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.574027 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.574027 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.574027 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.574027 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.574027 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.574027 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ae11141b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.574027 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ae11141b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.574027 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c511ed6ec9d3896a53a93cc4e20363be23faf324131acbc0d1399a9a4
2026-02-02T15:31:58.574027 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(42dcae9d) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.575532 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(42dcae9d) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 511ed6ec9d3896a53a93cc4e20363be23faf324131acbc0d1399a9a4
2026-02-02T15:31:58.575532 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:58.575532 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:58.575532 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ffbdc63a) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:58.575532 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ffbdc63a) END (from buffer). Returning 28 bytes: 511ed6ec9d3896a53a93cc4e20363be23faf324131acbc0d1399a9a4. Buffer after: 0 bytes: 
2026-02-02T15:31:58.575532 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [81, 30, 214, 236]
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 511ed6ec9d3896a53a93cc4e20363be23faf324131acbc0d1399a9a4
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 511ed6ec9d3896a53a93cc4e
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 20363be23faf324131acbc0d1399a9a4
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [81, 30, 214, 236]
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [32, 54, 59, 226]
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [32, 54, 59, 226, 63, 175, 50, 65, 49, 172, 188, 13, 19, 153, 169, 164]
2026-02-02T15:31:58.575532 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.575532 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:58.577052 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:31:58.577052 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:58.577052 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:58.577052 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.577052 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.577052 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:58.577052 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:58.577052 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:58.577052 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 30 bytes successfully. Data preview (hex): 001c511ed6ec9d3896a53a93cc4e20363be23faf...
2026-02-02T15:31:58.577052 [FINE] [YamuxStream] [7][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:31:58.577052 [FINE] [YamuxStream] [7][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:31:58.578057 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, duration=64ms
2026-02-02T15:31:58.578057 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:58.578057 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c208f5ab40fddee098cac0f662d9e519c9891d0301760678a73653e2f
2026-02-02T15:31:58.578057 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ae11141b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:58.578057 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ae11141b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 208f5ab40fddee098cac0f662d9e519c9891d0301760678a73653e2f
2026-02-02T15:31:58.578057 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:58.578057 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:58.578683 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:58.578683 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(f86a5af6) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:58.578683 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(f86a5af6) END (from buffer). Returning 28 bytes: 208f5ab40fddee098cac0f662d9e519c9891d0301760678a73653e2f. Buffer after: 0 bytes: 
2026-02-02T15:31:58.578683 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [32, 143, 90, 180]
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 208f5ab40fddee098cac0f662d9e519c9891d0301760678a73653e2f
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 208f5ab40fddee098cac0f66
2026-02-02T15:31:58.578683 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2d9e519c9891d0301760678a73653e2f
2026-02-02T15:31:58.579687 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [32, 143, 90, 180]
2026-02-02T15:31:58.579687 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [45, 158, 81, 156]
2026-02-02T15:31:58.579687 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [45, 158, 81, 156, 152, 145, 208, 48, 23, 96, 103, 138, 115, 101, 62, 47]
2026-02-02T15:31:58.580192 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:58.580192 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:58.580192 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:58.580192 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:58.580192 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:31:58.580192 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:58.580192 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:58.580192 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:58.580959 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:58.580959 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.580959 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.580959 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.580959 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.580959 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f0090a27) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.580959 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f0090a27) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:58.580959 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:58.581970 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:58.581970 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:58.581970 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:58.581970 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:58.581970 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:58.581970 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:58.581970 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:58.582970 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(415c8888) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:58.582970 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(415c8888) ASYNC WAIT. Requested: 2. Buffer: 0
01:06 +957 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +958 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +959 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +960 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +961 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +962 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +963 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +964 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +965 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +965 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:59.081983 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF via protocol /ipfs/1.0.0
2026-02-02T15:31:59.081983 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, protocols: [/ipfs/1.0.0]
2026-02-02T15:31:59.082982 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF...
2026-02-02T15:31:59.082982 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:59.082982 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF...
2026-02-02T15:31:59.082982 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Context HashCode: 157513706
2026-02-02T15:31:59.082982 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF.
2026-02-02T15:31:59.082982 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF).
2026-02-02T15:31:59.082982 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF, existing_conns=1
2026-02-02T15:31:59.082982 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF"
2026-02-02T15:31:59.082982 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF"
2026-02-02T15:31:59.082982 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Validating health...
2026-02-02T15:31:59.083981 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Returning newest connection ID: 0
2026-02-02T15:31:59.083981 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Conn runtimeType: SwarmConn, Conn ID: 0, Conn local: 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz, Conn remote: 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:59.083981 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF on SwarmConn 0.
2026-02-02T15:31:59.083981 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Context HashCode: 157513706
2026-02-02T15:31:59.083981 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:31:59.083981 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:31:59.083981 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:31:59.083981 [FINE] [YamuxStream] [7][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:59.084981 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:59.084981 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:31:59.084981 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:59.084981 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:59.084981 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 30 bytes: 001c925dde002a726ac55046f292fca40f089590394259e77aaac0f7e3e2
2026-02-02T15:31:59.084981 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 30 bytes successfully. Data preview (hex): 001c925dde002a726ac55046f292fca40f089590...
2026-02-02T15:31:59.085981 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c925dde002a726ac55046f292fca40f089590394259e77aaac0f7e3e2
2026-02-02T15:31:59.085981 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f0090a27) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:59.085981 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f0090a27) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 925dde002a726ac55046f292fca40f089590394259e77aaac0f7e3e2
2026-02-02T15:31:59.085981 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:59.085981 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.085981 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:59.085981 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:59.085981 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:59.085981 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:59.085981 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:59.085981 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a055d93b) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:59.086981 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(a055d93b) END (from buffer). Returning 28 bytes: 925dde002a726ac55046f292fca40f089590394259e77aaac0f7e3e2. Buffer after: 0 bytes: 
2026-02-02T15:31:59.086981 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [146, 93, 222, 0]
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 925dde002a726ac55046f292fca40f089590394259e77aaac0f7e3e2
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 925dde002a726ac55046f292
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: fca40f089590394259e77aaac0f7e3e2
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [146, 93, 222, 0]
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [252, 164, 15, 8]
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [252, 164, 15, 8, 149, 144, 57, 66, 89, 231, 122, 170, 192, 247, 227, 226]
2026-02-02T15:31:59.086981 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.086981 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:59.087981 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:31:59.087981 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:59.087981 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:59.087981 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.087981 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.087981 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:59.087981 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:59.087981 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:59.087981 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:59.088980 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 30 bytes: 001c5be62964c40ab6e8c5ec7d0e57d0350d91b3b4e0fcae12968a41fac9
2026-02-02T15:31:59.088980 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 30 bytes successfully. Data preview (hex): 001c5be62964c40ab6e8c5ec7d0e57d0350d91b3...
2026-02-02T15:31:59.088980 [FINE] [YamuxStream] [6][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:31:59.088980 [FINER] [YamuxStream] [6][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:59.088980 [FINE] [YamuxStream] [6][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:59.088980 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:59.088980 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:59.088980 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:59.089979 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:59.089979 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 30 bytes: 001c1ba8384ea35f05a414301924fd054cb07ae4d65891bae6f8ab396a21
2026-02-02T15:31:59.089979 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001c5be62964c40ab6e8c5ec7d0e57d0350d91b3b4e0fcae12968a41fac9001c1ba8384ea35f05a414301924fd054cb07ae4d65891bae6f8ab396a21
2026-02-02T15:31:59.089979 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(415c8888) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:59.089979 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(415c8888) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 5be62964c40ab6e8c5ec7d0e57d0350d91b3b4e0fcae12968a41fac9001c1ba8384ea35f05a414301924fd054cb07ae4d65891bae6f8ab396a21
2026-02-02T15:31:59.089979 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:59.089979 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.089979 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:59.089979 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:59.089979 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:59.090980 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:59.090980 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(24aa85c4) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:31:59.090980 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(24aa85c4) END (from buffer). Returning 28 bytes: 5be62964c40ab6e8c5ec7d0e57d0350d91b3b4e0fcae12968a41fac9. Buffer after: 30 bytes: 001c1ba8384ea35f05a414301924fd054cb07ae4d65891bae6f8ab396a21
2026-02-02T15:31:59.090980 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [91, 230, 41, 100]
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 5be62964c40ab6e8c5ec7d0e57d0350d91b3b4e0fcae12968a41fac9
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5be62964c40ab6e8c5ec7d0e
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 57d0350d91b3b4e0fcae12968a41fac9
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [91, 230, 41, 100]
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [87, 208, 53, 13]
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [87, 208, 53, 13, 145, 179, 180, 224, 252, 174, 18, 150, 138, 65, 250, 201]
2026-02-02T15:31:59.090980 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.090980 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:59.091980 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:59.091980 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:59.091980 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:59.091980 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.091980 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.091980 [FINER] [YamuxStream] [7][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:31:59.091980 [FINER] [YamuxStream] [7][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:31:59.091980 [FINE] [YamuxStream] [7][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:31:59.091980 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:31:59.091980 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:31:59.091980 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:59.091980 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:59.091980 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 30 bytes: 001cc4365b35bf84e043c0efab052860641957a823dfdab952fc78d9835c
2026-02-02T15:31:59.092979 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 30 bytes successfully. Data preview (hex): 001cc4365b35bf84e043c0efab052860641957a8...
2026-02-02T15:31:59.092979 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:31:59.092979 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:31:59.092979 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067919092-5926 for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:59.092979 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:31:59.092979 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:31:59.092979 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:59.092979 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:31:59.092979 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF already identified on this connection, skipping
2026-02-02T15:31:59.092979 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF (e.g., connection was closed). Identify will not complete.
2026-02-02T15:31:59.092979 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:31:59.093978 [FINE] [YamuxStream] [7][Client] StreamID=3 setDeadline() set to 2026-02-02T15:32:09.093978
2026-02-02T15:31:59.093978 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/ipfs/1.0.0] on stream 3...
2026-02-02T15:31:59.093978 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:31:59.093978 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:59.093978 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:31:59.093978 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:59.093978 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:59.093978 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 50 bytes: 00308e8340abeac0796306a786d8c7e9dd58e555021cb8390fbcf1ea85ef3eaf6d2115f62718277c9b8295fb6614c4cc3e97
2026-02-02T15:31:59.093978 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 30 bytes successfully. Data preview (hex): 001c1ba8384ea35f05a414301924fd054cb07ae4...
2026-02-02T15:31:59.093978 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:31:59.094978 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz on conn 0
2026-02-02T15:31:59.094978 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770067919094-6944 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:59.094978 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:31:59.094978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:59.094978 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.094978 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.094978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.094978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.094978 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.094978 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.094978 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.094978 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.094978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.094978 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(1d583164) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:59.095978 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(1d583164) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 1ba8384ea35f05a414301924fd054cb07ae4d65891bae6f8ab396a21
2026-02-02T15:31:59.095978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:59.095978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:59.095978 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(c7c4a46c) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:59.095978 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(c7c4a46c) END (from buffer). Returning 28 bytes: 1ba8384ea35f05a414301924fd054cb07ae4d65891bae6f8ab396a21. Buffer after: 0 bytes: 
2026-02-02T15:31:59.095978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [27, 168, 56, 78]
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1ba8384ea35f05a414301924fd054cb07ae4d65891bae6f8ab396a21
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:59.095978 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:59.096888 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1ba8384ea35f05a414301924
2026-02-02T15:31:59.096888 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: fd054cb07ae4d65891bae6f8ab396a21
2026-02-02T15:31:59.096888 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [27, 168, 56, 78]
2026-02-02T15:31:59.096888 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [253, 5, 76, 176]
2026-02-02T15:31:59.096888 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [253, 5, 76, 176, 122, 228, 214, 88, 145, 186, 230, 248, 171, 57, 106, 33]
2026-02-02T15:31:59.097397 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.097397 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:59.097397 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:31:59.097397 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:59.097397 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:59.097397 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.097397 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.097397 [FINER] [YamuxStream] [7][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:59.097397 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc4365b35bf84e043c0efab052860641957a823dfdab952fc78d9835c
2026-02-02T15:31:59.098414 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 50 bytes successfully. Data preview (hex): 00308e8340abeac0796306a786d8c7e9dd58e555...
2026-02-02T15:31:59.098414 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 4ms
2026-02-02T15:31:59.098414 [FINEST] [YamuxStream] [7][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:59.098414 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.098414 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.098414 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.099173 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.099173 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.099173 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.099173 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.099173 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.099173 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.099173 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(45e37b27) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:59.099691 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(45e37b27) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c4365b35bf84e043c0efab052860641957a823dfdab952fc78d9835c
2026-02-02T15:31:59.099691 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:59.099691 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.099691 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:59.099691 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:59.099691 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:59.099691 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:59.099691 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:59.099691 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(9a7d42bf) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:59.099691 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(9a7d42bf) END (from buffer). Returning 28 bytes: c4365b35bf84e043c0efab052860641957a823dfdab952fc78d9835c. Buffer after: 0 bytes: 
2026-02-02T15:31:59.100905 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [196, 54, 91, 53]
2026-02-02T15:31:59.100905 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:59.100905 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c4365b35bf84e043c0efab052860641957a823dfdab952fc78d9835c
2026-02-02T15:31:59.100905 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:59.100905 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:59.100905 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c4365b35bf84e043c0efab05
2026-02-02T15:31:59.101409 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2860641957a823dfdab952fc78d9835c
2026-02-02T15:31:59.101409 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [196, 54, 91, 53]
2026-02-02T15:31:59.101409 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [40, 96, 100, 25]
2026-02-02T15:31:59.101409 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [40, 96, 100, 25, 87, 168, 35, 223, 218, 185, 82, 252, 120, 217, 131, 92]
2026-02-02T15:31:59.101409 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.101409 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:31:59.102425 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:59.102425 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.102425 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.102425 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.102425 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.102425 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.102425 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.103971 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ab65016e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:59.103971 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ab65016e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:59.103971 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00308e8340abeac0796306a786d8c7e9dd58e555021cb8390fbcf1ea85ef3eaf6d2115f62718277c9b8295fb6614c4cc3e97
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.103971 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b3cb8063) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:31:59.103971 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b3cb8063) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 8e8340abeac0796306a786d8c7e9dd58e555021cb8390fbcf1ea85ef3eaf6d2115f62718277c9b8295fb6614c4cc3e97
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:59.103971 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:59.103971 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:59.105362 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(dc489d85) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:59.105362 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(dc489d85) END (from buffer). Returning 48 bytes: 8e8340abeac0796306a786d8c7e9dd58e555021cb8390fbcf1ea85ef3eaf6d2115f62718277c9b8295fb6614c4cc3e97. Buffer after: 0 bytes: 
2026-02-02T15:31:59.105362 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [142, 131, 64, 171]
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 8e8340abeac0796306a786d8c7e9dd58e555021cb8390fbcf1ea85ef3eaf6d2115f62718277c9b8295fb6614c4cc3e97
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8e8340abeac0796306a786d8c7e9dd58e555021cb8390fbcf1ea85ef3eaf6d21
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 15f62718277c9b8295fb6614c4cc3e97
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [142, 131, 64, 171]
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [21, 246, 39, 24]
2026-02-02T15:31:59.105362 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [21, 246, 39, 24, 39, 124, 155, 130, 149, 251, 102, 20, 196, 204, 62, 151]
2026-02-02T15:31:59.105866 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.105866 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:59.105866 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:31:59.105866 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:59.106869 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:59.107377 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:59.108344 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:59.108344 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:59.108344 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.108344 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:59.108344 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:59.108344 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:59.109348 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:31:59.109348 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:31:59.109348 [FINE] [YamuxStream] [6][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:31:59.109348 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:31:59.109348 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:59.109348 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:31:59.109348 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:31:59.109348 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 50 bytes: 0030ac9c6ad96fffbbe6210c56a57c95271003f3ca69858256b36cdaee462be1f39eecf09a086301992fcead79d20348876d
2026-02-02T15:31:59.110673 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 50 bytes successfully. Data preview (hex): 0030ac9c6ad96fffbbe6210c56a57c95271003f3...
2026-02-02T15:31:59.110673 [FINE] [YamuxStream] [6][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:31:59.110673 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:31:59.110673 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:31:59.110673 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:59.111670 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.111670 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.111670 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.111670 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.111670 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.112672 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.112672 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.116183 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.116948 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.116948 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ba984a01) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:59.116948 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ba984a01) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:59.117453 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030ac9c6ad96fffbbe6210c56a57c95271003f3ca69858256b36cdaee462be1f39eecf09a086301992fcead79d20348876d
2026-02-02T15:31:59.117453 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ab65016e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:59.117453 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(ab65016e) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: ac9c6ad96fffbbe6210c56a57c95271003f3ca69858256b36cdaee462be1f39eecf09a086301992fcead79d20348876d
2026-02-02T15:31:59.117453 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:31:59.117453 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:31:59.117453 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(dfdd49a2) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:31:59.117453 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(dfdd49a2) END (from buffer). Returning 48 bytes: ac9c6ad96fffbbe6210c56a57c95271003f3ca69858256b36cdaee462be1f39eecf09a086301992fcead79d20348876d. Buffer after: 0 bytes: 
2026-02-02T15:31:59.117453 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [172, 156, 106, 217]
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: ac9c6ad96fffbbe6210c56a57c95271003f3ca69858256b36cdaee462be1f39eecf09a086301992fcead79d20348876d
2026-02-02T15:31:59.117453 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:31:59.118581 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:31:59.118581 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ac9c6ad96fffbbe6210c56a57c95271003f3ca69858256b36cdaee462be1f39e
2026-02-02T15:31:59.118581 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ecf09a086301992fcead79d20348876d
2026-02-02T15:31:59.118581 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [172, 156, 106, 217]
2026-02-02T15:31:59.119822 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [236, 240, 154, 8]
2026-02-02T15:31:59.119822 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [236, 240, 154, 8, 99, 1, 153, 47, 206, 173, 121, 210, 3, 72, 135, 109]
2026-02-02T15:31:59.119822 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.119822 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:59.119822 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:31:59.119822 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:31:59.119822 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:31:59.119822 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:31:59.120823 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:31:59.120823 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.120823 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:31:59.120823 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:31:59.120823 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:31:59.120823 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 13 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:59.120823 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 25, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13, 12, 47, 105, 112, 102, 115, 47, 49])
2026-02-02T15:31:59.120823 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:31:59.122327 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 41 bytes (plaintext was 25)
2026-02-02T15:31:59.122327 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 43
2026-02-02T15:31:59.122327 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 43 bytes: 0029ef3bcb522547ae46755ab10050487234d5263b70812714d70a3d1d6ec45efdd434db380879355258ef
2026-02-02T15:31:59.123343 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.124346 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.124346 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.124346 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.124346 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.124346 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.124346 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.124346 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.124346 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.124346 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bd6dfb23) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:59.124346 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bd6dfb23) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:59.127316 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (43 bytes): 0029ef3bcb522547ae46755ab10050487234d5263b70812714d70a3d1d6ec45efdd434db380879355258ef
2026-02-02T15:31:59.127316 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ba984a01) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:59.127316 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(ba984a01) END (from buffer). Returning 2 bytes: 0029. Buffer after: 41 bytes: ef3bcb522547ae46755ab10050487234d5263b70812714d70a3d1d6ec45efdd434db380879355258ef
2026-02-02T15:31:59.127316 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 41]
2026-02-02T15:31:59.127316 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.127316 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 41]
2026-02-02T15:31:59.127316 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0029
2026-02-02T15:31:59.127821 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 41
2026-02-02T15:31:59.127821 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 41
2026-02-02T15:31:59.127821 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 41 more bytes (have 0/41)
2026-02-02T15:31:59.127821 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(126a57e4) START. Requested: 41. Buffer: 41 bytes.
2026-02-02T15:31:59.127821 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(126a57e4) END (from buffer). Returning 41 bytes: ef3bcb522547ae46755ab10050487234d5263b70812714d70a3d1d6ec45efdd434db380879355258ef. Buffer after: 0 bytes: 
2026-02-02T15:31:59.127821 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 41 bytes. First 4 bytes: [239, 59, 203, 82]
2026-02-02T15:31:59.127821 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 41, Got: 41
2026-02-02T15:31:59.127821 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 41, Bytes: ef3bcb522547ae46755ab10050487234d5263b70812714d70a3d1d6ec45efdd434db380879355258ef
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 41
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(25) and MAC(16)
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ef3bcb522547ae46755ab10050487234d5263b70812714d70a
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3d1d6ec45efdd434db380879355258ef
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [239, 59, 203, 82]
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [61, 29, 110, 196]
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [61, 29, 110, 196, 94, 253, 212, 52, 219, 56, 8, 121, 53, 82, 88, 239]
2026-02-02T15:31:59.128350 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.128350 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:59.128866 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 25 bytes
2026-02-02T15:31:59.128866 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 25 bytes to _decryptedBuffer. New _decryptedBuffer.length: 25
2026-02-02T15:31:59.128866 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 13. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13]
2026-02-02T15:31:59.128866 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.128866 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.128866 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=13
2026-02-02T15:31:59.128866 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.128866 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.129409 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.129409 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=13
2026-02-02T15:31:59.129409 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 13, _decryptedBuffer.length: 13
2026-02-02T15:31:59.129409 [FINER] [SecuredConnection] SecuredConnection.read (length=13): Returning 13 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [12, 47, 105, 112, 102, 115, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:59.129409 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=13
2026-02-02T15:31:59.129409 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.129409 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 13, flags: 0
2026-02-02T15:31:59.129409 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 13 bytes directly to waiting reader
2026-02-02T15:31:59.129409 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 33
2026-02-02T15:31:59.129409 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/1.0.0"
2026-02-02T15:31:59.129409 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/1.0.0"
2026-02-02T15:31:59.129409 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/1.0.0". Sending acknowledgment: "/ipfs/1.0.0".
2026-02-02T15:31:59.129409 [FINE] [YamuxStream] [6][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 13 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:31:59.129409 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 25, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13, 12, 47, 105, 112, 102, 115, 47, 49])
2026-02-02T15:31:59.130424 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:59.130872 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 41 bytes (plaintext was 25)
2026-02-02T15:31:59.130872 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 43
2026-02-02T15:31:59.130872 [FINER] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Writing 43 bytes: 002975e10bbf4eaa9a55d3f7cac474b4e40db37e02200e82b0cc669358032a9ef46fdda0d9fd0902ad9f15
2026-02-02T15:31:59.131379 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 43 bytes successfully. Data preview (hex): 0029ef3bcb522547ae46755ab10050487234d526...
2026-02-02T15:31:59.131379 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 13 bytes in 10ms
2026-02-02T15:31:59.131379 [FINEST] [YamuxStream] [7][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:59.132388 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.132388 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.132388 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.132388 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.132388 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.132388 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.132388 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.132388 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.132388 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.132388 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(49d5fc83) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:59.132388 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(49d5fc83) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:59.133800 [FINEST] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - RAW_SOCKET_DATA_CHUNK_RECV (43 bytes): 002975e10bbf4eaa9a55d3f7cac474b4e40db37e02200e82b0cc669358032a9ef46fdda0d9fd0902ad9f15
2026-02-02T15:31:59.133800 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bd6dfb23) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:59.134800 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(bd6dfb23) END (from buffer). Returning 2 bytes: 0029. Buffer after: 41 bytes: 75e10bbf4eaa9a55d3f7cac474b4e40db37e02200e82b0cc669358032a9ef46fdda0d9fd0902ad9f15
2026-02-02T15:31:59.134800 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 41]
2026-02-02T15:31:59.134800 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.134800 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 41]
2026-02-02T15:31:59.134800 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0029
2026-02-02T15:31:59.134800 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 41
2026-02-02T15:31:59.134800 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 41
2026-02-02T15:31:59.134800 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 41 more bytes (have 0/41)
2026-02-02T15:31:59.134800 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(7b5b4b17) START. Requested: 41. Buffer: 41 bytes.
2026-02-02T15:31:59.134800 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(7b5b4b17) END (from buffer). Returning 41 bytes: 75e10bbf4eaa9a55d3f7cac474b4e40db37e02200e82b0cc669358032a9ef46fdda0d9fd0902ad9f15. Buffer after: 0 bytes: 
2026-02-02T15:31:59.134800 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 41 bytes. First 4 bytes: [117, 225, 11, 191]
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 41, Got: 41
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 41, Bytes: 75e10bbf4eaa9a55d3f7cac474b4e40db37e02200e82b0cc669358032a9ef46fdda0d9fd0902ad9f15
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 41
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(25) and MAC(16)
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 75e10bbf4eaa9a55d3f7cac474b4e40db37e02200e82b0cc66
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9358032a9ef46fdda0d9fd0902ad9f15
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [117, 225, 11, 191]
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [147, 88, 3, 42]
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [147, 88, 3, 42, 158, 244, 111, 221, 160, 217, 253, 9, 2, 173, 159, 21]
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059109959): [43, 228, 33, 2, 68, 53, 96, 244, 39, 159, 206, 0, 75, 251, 56, 96, 198, 3, 183, 35, 143, 218, 76, 107, 192, 44, 120, 150, 82, 235, 188, 31]
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 25 bytes
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 25 bytes to _decryptedBuffer. New _decryptedBuffer.length: 25
2026-02-02T15:31:59.135304 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 13. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13]
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=13
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.135304 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.136602 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=13
2026-02-02T15:31:59.136602 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 13, _decryptedBuffer.length: 13
2026-02-02T15:31:59.136602 [FINER] [SecuredConnection] SecuredConnection.read (length=13): Returning 13 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [12, 47, 105, 112, 102, 115, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:31:59.136602 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=13
2026-02-02T15:31:59.136602 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.136602 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 13, flags: 0
2026-02-02T15:31:59.136602 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 13 bytes directly to waiting reader
2026-02-02T15:31:59.136602 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 33
2026-02-02T15:31:59.136602 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /ipfs/1.0.0 on stream 3
2026-02-02T15:31:59.136602 [FINE] [YamuxStream] [7][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:31:59.136602 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /ipfs/1.0.0 on stream 3...
2026-02-02T15:31:59.136602 [FINE] [StreamScopeImpl] stream-1770067919092-5926: Setting protocol to /ipfs/1.0.0 for peer 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:59.136602 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/1.0.0
2026-02-02T15:31:59.136602 [FINE] [StreamScopeImpl] stream-1770067919092-5926: Successfully set protocol to /ipfs/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:59.136602 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:31:59.136602 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /ipfs/1.0.0
2026-02-02T15:31:59.136602 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 302 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524255
2026-02-02T15:31:59.137600 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 314, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 1, 46, 172, 2, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.137600 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:31:59.137600 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 330 bytes (plaintext was 314)
2026-02-02T15:31:59.137600 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 332
2026-02-02T15:31:59.137600 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 332 bytes: 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
2026-02-02T15:31:59.137600 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 332 bytes successfully. Data preview (hex): 014a7fb6dd01624b3805e0bee47b5e597292c7fc...
2026-02-02T15:31:59.137600 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 302 bytes in 0ms
2026-02-02T15:31:59.137600 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:31:59.137600 [FINE] [YamuxStream] [7][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:31:59.137600 [FINER] [YamuxStream] [7][Client] StreamID=3 Sending pending WINDOW_UPDATE for 33 consumed bytes before local FIN.
2026-02-02T15:31:59.137600 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 33])
2026-02-02T15:31:59.138928 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:31:59.138928 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:59.138928 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:59.139932 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 30 bytes: 001c9d6dcf051704b0f7def13f1a98acaadb8617406f66d66481924231f8
2026-02-02T15:31:59.140437 [FINEST] [TCPConnection] TCPConnection.write (id: d71c9997-c750-4b05-9a12-92ed21f628d3): Flushed 43 bytes successfully. Data preview (hex): 002975e10bbf4eaa9a55d3f7cac474b4e40db37e...
2026-02-02T15:31:59.140942 [FINE] [YamuxStream] [6][Server] StreamID=3 Direct write: Successfully wrote all 13 bytes in 11ms
2026-02-02T15:31:59.140942 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/1.0.0".
2026-02-02T15:31:59.140942 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/1.0.0" and its handler.
2026-02-02T15:31:59.140942 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:31:59.140942 [FINE] [StreamScopeImpl] stream-1770067919094-6944: Setting protocol to /ipfs/1.0.0 for peer 12D3KooWRmAcg7cVtUHsjANRxoTbNYWUHuW1mDQU4y3TCdhDuLdz
2026-02-02T15:31:59.140942 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/1.0.0
2026-02-02T15:31:59.141946 [FINE] [StreamScopeImpl] stream-1770067919094-6944: Successfully set protocol to /ipfs/1.0.0. Resources transferred, edges updated.
2026-02-02T15:31:59.141946 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:31:59.141946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:31:59.142450 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.142450 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.142450 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.142450 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.142450 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.142450 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.142450 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.142450 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.142450 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.142450 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(03ca76d6) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:59.143954 [FINER] [TCPConnection] TCPConnection(b2bbfdac-8aa4-4a94-9037-e1a86ecb0255) - Read(03ca76d6) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:59.143954 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (332 bytes): 014a7fb6dd01624b3805e0bee47b5e597292c7fcd636ac9e10bc11b853709b1c0e43eb6c536610c157cf24ff4b65b311310be180e3d719aca056f145a643623535520e27dbea28a87aac5c17f097bead1b44caf35d393047db6171463375c798cf94eca3fe4db2b59b252ceeaf187b98303b71f14995d0819047f4dd8c0df57387bbd48811cf29ff5ced43b309e0b642228ecbf05f41651eb250b9a855ddd85bc31a091371315caddc8cf7158cc72c751d24f0d9fd98d4dcca2cbdb8116cdd49b93834faad1e5e020aa0fdd8fe79b287f0aac7a9d146e59432fce74258be67c6cd89251450715b0a9e4441cc07d30142e140f17ead6adc277609594e806d3b218b0af7dbcf99829945bbd23eeff647410acd277c76dc42f73a416a1a6a8a8272b952098dc78f932640562935f8b763ea471dbfcc6d6972597af2302959d7f869ee215c043f194b91029d49d1
2026-02-02T15:31:59.143954 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(49d5fc83) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:31:59.143954 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(49d5fc83) END (from buffer). Returning 2 bytes: 014a. Buffer after: 330 bytes: 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
2026-02-02T15:31:59.144533 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 74]
2026-02-02T15:31:59.144533 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.144533 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 74]
2026-02-02T15:31:59.144533 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 014a
2026-02-02T15:31:59.144533 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 330
2026-02-02T15:31:59.144533 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 330
2026-02-02T15:31:59.145044 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 330 more bytes (have 0/330)
2026-02-02T15:31:59.145044 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(68a0d576) START. Requested: 330. Buffer: 330 bytes.
2026-02-02T15:31:59.146048 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(68a0d576) END (from buffer). Returning 330 bytes: 7fb6dd01624b3805e0bee47b5e597292c7fcd636ac9e10bc11b853709b1c0e43eb6c536610c157cf24ff4b65b311310be180e3d719aca056f145a643623535520e27dbea28a87aac5c17f097bead1b44caf35d393047db6171463375c798cf94eca3fe4db2b59b252ceeaf187b98303b71f14995d0819047f4dd8c0df57387bbd48811cf29ff5ced43b309e0b642228ecbf05f41651eb250b9a855ddd85bc31a091371315caddc8cf7158cc72c751d24f0d9fd98d4dcca2cbdb8116cdd49b93834faad1e5e020aa0fdd8fe79b287f0aac7a9d146e59432fce74258be67c6cd89251450715b0a9e4441cc07d30142e140f17ead6adc277609594e806d3b218b0af7dbcf99829945bbd23eeff647410acd277c76dc42f73a416a1a6a8a8272b952098dc78f932640562935f8b763ea471dbfcc6d6972597af2302959d7f869ee215c043f194b91029d49d1. Buffer after: 0 bytes: 
2026-02-02T15:31:59.146048 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 330 bytes. First 4 bytes: [127, 182, 221, 1]
2026-02-02T15:31:59.146048 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 330, Got: 330
2026-02-02T15:31:59.146048 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 330, Bytes: 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
2026-02-02T15:31:59.146048 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 330
2026-02-02T15:31:59.146048 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(314) and MAC(16)
2026-02-02T15:31:59.146048 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7fb6dd01624b3805e0bee47b5e597292c7fcd636ac9e10bc11b853709b1c0e43eb6c536610c157cf24ff4b65b311310be180e3d719aca056f145a643623535520e27dbea28a87aac5c17f097bead1b44caf35d393047db6171463375c798cf94eca3fe4db2b59b252ceeaf187b98303b71f14995d0819047f4dd8c0df57387bbd48811cf29ff5ced43b309e0b642228ecbf05f41651eb250b9a855ddd85bc31a091371315caddc8cf7158cc72c751d24f0d9fd98d4dcca2cbdb8116cdd49b93834faad1e5e020aa0fdd8fe79b287f0aac7a9d146e59432fce74258be67c6cd89251450715b0a9e4441cc07d30142e140f17ead6adc277609594e806d3b218b0af7dbcf99829945bbd23eeff647410acd277c76dc42f73a416a1a6a8a8272b952098dc78f932640562935f8b763ea471dbfcc6d6972597af23029
2026-02-02T15:31:59.146551 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 59d7f869ee215c043f194b91029d49d1
2026-02-02T15:31:59.146551 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [127, 182, 221, 1]
2026-02-02T15:31:59.146551 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [89, 215, 248, 105]
2026-02-02T15:31:59.146551 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [89, 215, 248, 105, 238, 33, 92, 4, 63, 25, 75, 145, 2, 157, 73, 209]
2026-02-02T15:31:59.146551 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.146551 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 314 bytes
2026-02-02T15:31:59.148058 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 314 bytes to _decryptedBuffer. New _decryptedBuffer.length: 314
2026-02-02T15:31:59.148058 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 302. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 1, 46]
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=302
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.148058 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=302
2026-02-02T15:31:59.149124 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 302, _decryptedBuffer.length: 302
2026-02-02T15:31:59.149124 [FINER] [SecuredConnection] SecuredConnection.read (length=302): Returning 302 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [172, 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:31:59.149124 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=302
2026-02-02T15:31:59.149124 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.149124 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 302, flags: 0
2026-02-02T15:31:59.149124 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 302 bytes directly to waiting reader
2026-02-02T15:31:59.149124 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 335
2026-02-02T15:31:59.149124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.149124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 301 bytes from queue.
2026-02-02T15:31:59.149124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 301. Returning partial and re-queuing 300 bytes.
2026-02-02T15:31:59.149124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.149124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 300 bytes from queue.
2026-02-02T15:31:59.149124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 300. Returning partial and re-queuing 299 bytes.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 299 bytes from queue.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 299. Returning partial and re-queuing 298 bytes.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 298 bytes from queue.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 298. Returning partial and re-queuing 297 bytes.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 297 bytes from queue.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 297. Returning partial and re-queuing 296 bytes.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 296 bytes from queue.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 296. Returning partial and re-queuing 295 bytes.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 295 bytes from queue.
2026-02-02T15:31:59.150631 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 295. Returning partial and re-queuing 294 bytes.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 294 bytes from queue.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 294. Returning partial and re-queuing 293 bytes.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 293 bytes from queue.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 293. Returning partial and re-queuing 292 bytes.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 292 bytes from queue.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 292. Returning partial and re-queuing 291 bytes.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 291 bytes from queue.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 291. Returning partial and re-queuing 290 bytes.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 290 bytes from queue.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 290. Returning partial and re-queuing 289 bytes.
2026-02-02T15:31:59.151743 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 289 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 289. Returning partial and re-queuing 288 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 288 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 288. Returning partial and re-queuing 287 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 287 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 287. Returning partial and re-queuing 286 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 286 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 286. Returning partial and re-queuing 285 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 285 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 285. Returning partial and re-queuing 284 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 284 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 284. Returning partial and re-queuing 283 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 283 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 283. Returning partial and re-queuing 282 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 282 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 282. Returning partial and re-queuing 281 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 281 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 281. Returning partial and re-queuing 280 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 280 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 280. Returning partial and re-queuing 279 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 279 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 279. Returning partial and re-queuing 278 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 278 bytes from queue.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 278. Returning partial and re-queuing 277 bytes.
2026-02-02T15:31:59.152249 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 277 bytes from queue.
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 277. Returning partial and re-queuing 276 bytes.
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 276 bytes from queue.
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 276. Returning partial and re-queuing 275 bytes.
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 275 bytes from queue.
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 275. Returning partial and re-queuing 274 bytes.
2026-02-02T15:31:59.153341 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 274 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 274. Returning partial and re-queuing 273 bytes.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 273 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 273. Returning partial and re-queuing 272 bytes.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 272 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 272. Returning partial and re-queuing 271 bytes.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 271 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 271. Returning partial and re-queuing 270 bytes.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 270 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 270. Returning partial and re-queuing 269 bytes.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 269 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 269. Returning partial and re-queuing 268 bytes.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 268 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 268. Returning partial and re-queuing 267 bytes.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 267 bytes from queue.
2026-02-02T15:31:59.154356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 267. Returning partial and re-queuing 266 bytes.
2026-02-02T15:31:59.156365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.156365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 266 bytes from queue.
2026-02-02T15:31:59.156365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 266. Returning partial and re-queuing 265 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 265 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 265. Returning partial and re-queuing 264 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 264 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 264. Returning partial and re-queuing 263 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 263 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 263. Returning partial and re-queuing 262 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 262 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 262. Returning partial and re-queuing 261 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 261 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 261. Returning partial and re-queuing 260 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 260 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 260. Returning partial and re-queuing 259 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 259 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 259. Returning partial and re-queuing 258 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 258 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 258. Returning partial and re-queuing 257 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 257 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 257. Returning partial and re-queuing 256 bytes.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 256 bytes from queue.
2026-02-02T15:31:59.158174 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 256. Returning partial and re-queuing 255 bytes.
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 255 bytes from queue.
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 255. Returning partial and re-queuing 254 bytes.
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 254 bytes from queue.
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 254. Returning partial and re-queuing 253 bytes.
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 253 bytes from queue.
2026-02-02T15:31:59.159193 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 253. Returning partial and re-queuing 252 bytes.
2026-02-02T15:31:59.160192 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.160192 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 252 bytes from queue.
2026-02-02T15:31:59.160192 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 252. Returning partial and re-queuing 251 bytes.
2026-02-02T15:31:59.160192 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.160192 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 251 bytes from queue.
2026-02-02T15:31:59.160192 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 251. Returning partial and re-queuing 250 bytes.
2026-02-02T15:31:59.160585 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.160585 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 250 bytes from queue.
2026-02-02T15:31:59.160585 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 250. Returning partial and re-queuing 249 bytes.
2026-02-02T15:31:59.161089 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.161089 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 249 bytes from queue.
2026-02-02T15:31:59.161089 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 249. Returning partial and re-queuing 248 bytes.
2026-02-02T15:31:59.161089 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.162101 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 248 bytes from queue.
2026-02-02T15:31:59.162101 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 248. Returning partial and re-queuing 247 bytes.
2026-02-02T15:31:59.164101 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.164608 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 247 bytes from queue.
2026-02-02T15:31:59.164608 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 247. Returning partial and re-queuing 246 bytes.
2026-02-02T15:31:59.164608 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.164608 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 246 bytes from queue.
2026-02-02T15:31:59.164608 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 246. Returning partial and re-queuing 245 bytes.
2026-02-02T15:31:59.164608 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.164608 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 245 bytes from queue.
2026-02-02T15:31:59.165112 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 245. Returning partial and re-queuing 244 bytes.
2026-02-02T15:31:59.165112 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.165112 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 244 bytes from queue.
2026-02-02T15:31:59.169124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 244. Returning partial and re-queuing 243 bytes.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 243 bytes from queue.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 243. Returning partial and re-queuing 242 bytes.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 242 bytes from queue.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 242. Returning partial and re-queuing 241 bytes.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 241 bytes from queue.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 241. Returning partial and re-queuing 240 bytes.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 240 bytes from queue.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 240. Returning partial and re-queuing 239 bytes.
2026-02-02T15:31:59.170124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.171124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 239 bytes from queue.
2026-02-02T15:31:59.171124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 239. Returning partial and re-queuing 238 bytes.
2026-02-02T15:31:59.171124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.171124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 238 bytes from queue.
2026-02-02T15:31:59.171124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 238. Returning partial and re-queuing 237 bytes.
2026-02-02T15:31:59.171124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.171124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 237 bytes from queue.
2026-02-02T15:31:59.174644 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 237. Returning partial and re-queuing 236 bytes.
2026-02-02T15:31:59.174644 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.174644 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 236 bytes from queue.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 236. Returning partial and re-queuing 235 bytes.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 235 bytes from queue.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 235. Returning partial and re-queuing 234 bytes.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 234 bytes from queue.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 234. Returning partial and re-queuing 233 bytes.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 233 bytes from queue.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 233. Returning partial and re-queuing 232 bytes.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 232 bytes from queue.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 232. Returning partial and re-queuing 231 bytes.
2026-02-02T15:31:59.177154 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.199147 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 231 bytes from queue.
2026-02-02T15:31:59.202077 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 231. Returning partial and re-queuing 230 bytes.
2026-02-02T15:31:59.202584 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.202584 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 230 bytes from queue.
2026-02-02T15:31:59.203594 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 230. Returning partial and re-queuing 229 bytes.
2026-02-02T15:31:59.203594 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.203594 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 229 bytes from queue.
2026-02-02T15:31:59.204196 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 229. Returning partial and re-queuing 228 bytes.
2026-02-02T15:31:59.204196 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.204196 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 228 bytes from queue.
2026-02-02T15:31:59.204196 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 228. Returning partial and re-queuing 227 bytes.
2026-02-02T15:31:59.204196 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.208655 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 227 bytes from queue.
2026-02-02T15:31:59.209161 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 227. Returning partial and re-queuing 226 bytes.
2026-02-02T15:31:59.209161 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 226 bytes from queue.
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 226. Returning partial and re-queuing 225 bytes.
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 225 bytes from queue.
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 225. Returning partial and re-queuing 224 bytes.
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 224 bytes from queue.
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 224. Returning partial and re-queuing 223 bytes.
2026-02-02T15:31:59.214704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 223 bytes from queue.
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 223. Returning partial and re-queuing 222 bytes.
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 222 bytes from queue.
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 222. Returning partial and re-queuing 221 bytes.
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 221 bytes from queue.
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 221. Returning partial and re-queuing 220 bytes.
2026-02-02T15:31:59.215705 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.216703 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 220 bytes from queue.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 220. Returning partial and re-queuing 219 bytes.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 219 bytes from queue.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 219. Returning partial and re-queuing 218 bytes.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 218 bytes from queue.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 218. Returning partial and re-queuing 217 bytes.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 217 bytes from queue.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 217. Returning partial and re-queuing 216 bytes.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 216 bytes from queue.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 216. Returning partial and re-queuing 215 bytes.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 215 bytes from queue.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 215. Returning partial and re-queuing 214 bytes.
2026-02-02T15:31:59.217639 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 214 bytes from queue.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 214. Returning partial and re-queuing 213 bytes.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 213 bytes from queue.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 213. Returning partial and re-queuing 212 bytes.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 212 bytes from queue.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 212. Returning partial and re-queuing 211 bytes.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 211 bytes from queue.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 211. Returning partial and re-queuing 210 bytes.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 210 bytes from queue.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 210. Returning partial and re-queuing 209 bytes.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 209 bytes from queue.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 209. Returning partial and re-queuing 208 bytes.
2026-02-02T15:31:59.218891 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 208 bytes from queue.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 208. Returning partial and re-queuing 207 bytes.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 207 bytes from queue.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 207. Returning partial and re-queuing 206 bytes.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 206 bytes from queue.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 206. Returning partial and re-queuing 205 bytes.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 205 bytes from queue.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 205. Returning partial and re-queuing 204 bytes.
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.220169 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 204 bytes from queue.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 204. Returning partial and re-queuing 203 bytes.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 203 bytes from queue.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 203. Returning partial and re-queuing 202 bytes.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 202 bytes from queue.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 202. Returning partial and re-queuing 201 bytes.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 201 bytes from queue.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 201. Returning partial and re-queuing 200 bytes.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 200 bytes from queue.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 200. Returning partial and re-queuing 199 bytes.
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.221167 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 199 bytes from queue.
2026-02-02T15:31:59.224672 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 199. Returning partial and re-queuing 198 bytes.
2026-02-02T15:31:59.225673 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.225673 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 198 bytes from queue.
2026-02-02T15:31:59.225673 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 198. Returning partial and re-queuing 197 bytes.
2026-02-02T15:31:59.225673 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.225673 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 197 bytes from queue.
2026-02-02T15:31:59.225673 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 197. Returning partial and re-queuing 196 bytes.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 196 bytes from queue.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 196. Returning partial and re-queuing 195 bytes.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 195 bytes from queue.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 195. Returning partial and re-queuing 194 bytes.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 194 bytes from queue.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 194. Returning partial and re-queuing 193 bytes.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 193 bytes from queue.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 193. Returning partial and re-queuing 192 bytes.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 192 bytes from queue.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 192. Returning partial and re-queuing 191 bytes.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 191 bytes from queue.
2026-02-02T15:31:59.226179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 191. Returning partial and re-queuing 190 bytes.
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 190 bytes from queue.
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 190. Returning partial and re-queuing 189 bytes.
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 189 bytes from queue.
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 189. Returning partial and re-queuing 188 bytes.
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 188 bytes from queue.
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 188. Returning partial and re-queuing 187 bytes.
2026-02-02T15:31:59.227182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 187 bytes from queue.
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 187. Returning partial and re-queuing 186 bytes.
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 186 bytes from queue.
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 186. Returning partial and re-queuing 185 bytes.
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 185 bytes from queue.
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 185. Returning partial and re-queuing 184 bytes.
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 184 bytes from queue.
2026-02-02T15:31:59.228183 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 184. Returning partial and re-queuing 183 bytes.
2026-02-02T15:31:59.229182 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.229968 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 183 bytes from queue.
2026-02-02T15:31:59.229968 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 183. Returning partial and re-queuing 182 bytes.
2026-02-02T15:31:59.229968 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.229968 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 182 bytes from queue.
2026-02-02T15:31:59.229968 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 182. Returning partial and re-queuing 181 bytes.
2026-02-02T15:31:59.230475 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.230475 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 181 bytes from queue.
2026-02-02T15:31:59.230475 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 181. Returning partial and re-queuing 180 bytes.
2026-02-02T15:31:59.230475 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.230475 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 180 bytes from queue.
2026-02-02T15:31:59.230475 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 180. Returning partial and re-queuing 179 bytes.
2026-02-02T15:31:59.231987 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.231987 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 179 bytes from queue.
2026-02-02T15:31:59.231987 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 179. Returning partial and re-queuing 178 bytes.
2026-02-02T15:31:59.231987 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.231987 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 178 bytes from queue.
2026-02-02T15:31:59.231987 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 178. Returning partial and re-queuing 177 bytes.
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 177 bytes from queue.
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 177. Returning partial and re-queuing 176 bytes.
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 176 bytes from queue.
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 176. Returning partial and re-queuing 175 bytes.
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 175 bytes from queue.
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 175. Returning partial and re-queuing 174 bytes.
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.232493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 174 bytes from queue.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 174. Returning partial and re-queuing 173 bytes.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 173 bytes from queue.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 173. Returning partial and re-queuing 172 bytes.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 172 bytes from queue.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 172. Returning partial and re-queuing 171 bytes.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 171 bytes from queue.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 171. Returning partial and re-queuing 170 bytes.
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.233505 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 170 bytes from queue.
2026-02-02T15:31:59.234504 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 170. Returning partial and re-queuing 169 bytes.
2026-02-02T15:31:59.234504 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.234504 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 169 bytes from queue.
2026-02-02T15:31:59.234504 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 169. Returning partial and re-queuing 168 bytes.
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 168 bytes from queue.
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 168. Returning partial and re-queuing 167 bytes.
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 167 bytes from queue.
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 167. Returning partial and re-queuing 166 bytes.
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 166 bytes from queue.
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 166. Returning partial and re-queuing 165 bytes.
2026-02-02T15:31:59.234898 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 165 bytes from queue.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 165. Returning partial and re-queuing 164 bytes.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 164 bytes from queue.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 164. Returning partial and re-queuing 163 bytes.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 163 bytes from queue.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 163. Returning partial and re-queuing 162 bytes.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 162 bytes from queue.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 162. Returning partial and re-queuing 161 bytes.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 161 bytes from queue.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 161. Returning partial and re-queuing 160 bytes.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 160 bytes from queue.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 160. Returning partial and re-queuing 159 bytes.
2026-02-02T15:31:59.235404 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 159 bytes from queue.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 159. Returning partial and re-queuing 158 bytes.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 158 bytes from queue.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 158. Returning partial and re-queuing 157 bytes.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 157 bytes from queue.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 157. Returning partial and re-queuing 156 bytes.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 156 bytes from queue.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 156. Returning partial and re-queuing 155 bytes.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 155 bytes from queue.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 155. Returning partial and re-queuing 154 bytes.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 154 bytes from queue.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 154. Returning partial and re-queuing 153 bytes.
2026-02-02T15:31:59.236494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 153 bytes from queue.
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 153. Returning partial and re-queuing 152 bytes.
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 152 bytes from queue.
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 152. Returning partial and re-queuing 151 bytes.
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 151 bytes from queue.
2026-02-02T15:31:59.237499 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 151. Returning partial and re-queuing 150 bytes.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 150 bytes from queue.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 150. Returning partial and re-queuing 149 bytes.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 149 bytes from queue.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 149. Returning partial and re-queuing 148 bytes.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 148 bytes from queue.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 148. Returning partial and re-queuing 147 bytes.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 147 bytes from queue.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 147. Returning partial and re-queuing 146 bytes.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 146 bytes from queue.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 146. Returning partial and re-queuing 145 bytes.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 145 bytes from queue.
2026-02-02T15:31:59.238512 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 145. Returning partial and re-queuing 144 bytes.
2026-02-02T15:31:59.244031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.244031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 144 bytes from queue.
2026-02-02T15:31:59.244031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 144. Returning partial and re-queuing 143 bytes.
2026-02-02T15:31:59.244031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.244031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 143 bytes from queue.
2026-02-02T15:31:59.244031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 143. Returning partial and re-queuing 142 bytes.
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 142 bytes from queue.
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 142. Returning partial and re-queuing 141 bytes.
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 141 bytes from queue.
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 141. Returning partial and re-queuing 140 bytes.
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 140 bytes from queue.
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 140. Returning partial and re-queuing 139 bytes.
2026-02-02T15:31:59.245031 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.245535 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 139 bytes from queue.
2026-02-02T15:31:59.246851 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 139. Returning partial and re-queuing 138 bytes.
2026-02-02T15:31:59.246851 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.246851 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 138 bytes from queue.
2026-02-02T15:31:59.246851 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 138. Returning partial and re-queuing 137 bytes.
2026-02-02T15:31:59.246851 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 137 bytes from queue.
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 137. Returning partial and re-queuing 136 bytes.
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 136 bytes from queue.
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 136. Returning partial and re-queuing 135 bytes.
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 135 bytes from queue.
2026-02-02T15:31:59.247356 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 135. Returning partial and re-queuing 134 bytes.
2026-02-02T15:31:59.247869 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.247869 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 134 bytes from queue.
2026-02-02T15:31:59.247869 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 134. Returning partial and re-queuing 133 bytes.
2026-02-02T15:31:59.247869 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 133 bytes from queue.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 133. Returning partial and re-queuing 132 bytes.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 132 bytes from queue.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 132. Returning partial and re-queuing 131 bytes.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 131 bytes from queue.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 131. Returning partial and re-queuing 130 bytes.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 130 bytes from queue.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 130. Returning partial and re-queuing 129 bytes.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 129 bytes from queue.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 129. Returning partial and re-queuing 128 bytes.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 128 bytes from queue.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 128. Returning partial and re-queuing 127 bytes.
2026-02-02T15:31:59.248421 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 127 bytes from queue.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 127. Returning partial and re-queuing 126 bytes.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 126 bytes from queue.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 126. Returning partial and re-queuing 125 bytes.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 125 bytes from queue.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 125. Returning partial and re-queuing 124 bytes.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 124 bytes from queue.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 124. Returning partial and re-queuing 123 bytes.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 123 bytes from queue.
2026-02-02T15:31:59.249434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 123. Returning partial and re-queuing 122 bytes.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 122 bytes from queue.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 122. Returning partial and re-queuing 121 bytes.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 121 bytes from queue.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 121. Returning partial and re-queuing 120 bytes.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 120 bytes from queue.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 120. Returning partial and re-queuing 119 bytes.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 119 bytes from queue.
2026-02-02T15:31:59.250434 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 119. Returning partial and re-queuing 118 bytes.
2026-02-02T15:31:59.251158 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.251158 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 118 bytes from queue.
2026-02-02T15:31:59.251158 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 118. Returning partial and re-queuing 117 bytes.
2026-02-02T15:31:59.251158 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.251158 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 117 bytes from queue.
2026-02-02T15:31:59.251158 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 117. Returning partial and re-queuing 116 bytes.
2026-02-02T15:31:59.251158 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 116 bytes from queue.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 116. Returning partial and re-queuing 115 bytes.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 115 bytes from queue.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 115. Returning partial and re-queuing 114 bytes.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 114 bytes from queue.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 114. Returning partial and re-queuing 113 bytes.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 113 bytes from queue.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 113. Returning partial and re-queuing 112 bytes.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 112 bytes from queue.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 112. Returning partial and re-queuing 111 bytes.
2026-02-02T15:31:59.251670 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 111 bytes from queue.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 111. Returning partial and re-queuing 110 bytes.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 110 bytes from queue.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 110. Returning partial and re-queuing 109 bytes.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 109 bytes from queue.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 109. Returning partial and re-queuing 108 bytes.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 108 bytes from queue.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 108. Returning partial and re-queuing 107 bytes.
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.252704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 107 bytes from queue.
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 107. Returning partial and re-queuing 106 bytes.
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 106 bytes from queue.
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 106. Returning partial and re-queuing 105 bytes.
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 105 bytes from queue.
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 105. Returning partial and re-queuing 104 bytes.
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.253704 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 104 bytes from queue.
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 104. Returning partial and re-queuing 103 bytes.
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 103 bytes from queue.
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 103. Returning partial and re-queuing 102 bytes.
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 102 bytes from queue.
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 102. Returning partial and re-queuing 101 bytes.
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 101 bytes from queue.
2026-02-02T15:31:59.254425 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 101. Returning partial and re-queuing 100 bytes.
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 100 bytes from queue.
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 100. Returning partial and re-queuing 99 bytes.
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 99 bytes from queue.
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 99. Returning partial and re-queuing 98 bytes.
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.254946 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 98 bytes from queue.
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 98. Returning partial and re-queuing 97 bytes.
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 97 bytes from queue.
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 97. Returning partial and re-queuing 96 bytes.
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 96 bytes from queue.
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 96. Returning partial and re-queuing 95 bytes.
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.255457 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 95 bytes from queue.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 95. Returning partial and re-queuing 94 bytes.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 94 bytes from queue.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 94. Returning partial and re-queuing 93 bytes.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 93 bytes from queue.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 93. Returning partial and re-queuing 92 bytes.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 92 bytes from queue.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 92. Returning partial and re-queuing 91 bytes.
2026-02-02T15:31:59.255969 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.257478 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 91 bytes from queue.
2026-02-02T15:31:59.257478 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 91. Returning partial and re-queuing 90 bytes.
2026-02-02T15:31:59.257478 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 90 bytes from queue.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 90. Returning partial and re-queuing 89 bytes.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 89 bytes from queue.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 89. Returning partial and re-queuing 88 bytes.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 88 bytes from queue.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 88. Returning partial and re-queuing 87 bytes.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 87 bytes from queue.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 87. Returning partial and re-queuing 86 bytes.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 86 bytes from queue.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 86. Returning partial and re-queuing 85 bytes.
2026-02-02T15:31:59.257975 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 85 bytes from queue.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 85. Returning partial and re-queuing 84 bytes.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 84 bytes from queue.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 84. Returning partial and re-queuing 83 bytes.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 83 bytes from queue.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 83. Returning partial and re-queuing 82 bytes.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 82 bytes from queue.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 82. Returning partial and re-queuing 81 bytes.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 81 bytes from queue.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 81. Returning partial and re-queuing 80 bytes.
2026-02-02T15:31:59.258979 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 80 bytes from queue.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 80. Returning partial and re-queuing 79 bytes.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 79 bytes from queue.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 79. Returning partial and re-queuing 78 bytes.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 78 bytes from queue.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 78. Returning partial and re-queuing 77 bytes.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 77 bytes from queue.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 77. Returning partial and re-queuing 76 bytes.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 76 bytes from queue.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 76. Returning partial and re-queuing 75 bytes.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 75 bytes from queue.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 75. Returning partial and re-queuing 74 bytes.
2026-02-02T15:31:59.259978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 74 bytes from queue.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 74. Returning partial and re-queuing 73 bytes.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 73 bytes from queue.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 73. Returning partial and re-queuing 72 bytes.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 72 bytes from queue.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 72. Returning partial and re-queuing 71 bytes.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 71 bytes from queue.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 71. Returning partial and re-queuing 70 bytes.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 70 bytes from queue.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 70. Returning partial and re-queuing 69 bytes.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 69 bytes from queue.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 69. Returning partial and re-queuing 68 bytes.
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.260978 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 68 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 68. Returning partial and re-queuing 67 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 67 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 67. Returning partial and re-queuing 66 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 66 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 66. Returning partial and re-queuing 65 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 65 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 65. Returning partial and re-queuing 64 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 64 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 64. Returning partial and re-queuing 63 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 63 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 63. Returning partial and re-queuing 62 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 62 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 62. Returning partial and re-queuing 61 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 61 bytes from queue.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 61. Returning partial and re-queuing 60 bytes.
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.262113 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 60 bytes from queue.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 60. Returning partial and re-queuing 59 bytes.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 59 bytes from queue.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 59. Returning partial and re-queuing 58 bytes.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 58 bytes from queue.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 58. Returning partial and re-queuing 57 bytes.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 57 bytes from queue.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 57. Returning partial and re-queuing 56 bytes.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 56 bytes from queue.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 56. Returning partial and re-queuing 55 bytes.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 55 bytes from queue.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 55. Returning partial and re-queuing 54 bytes.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 54 bytes from queue.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 54. Returning partial and re-queuing 53 bytes.
2026-02-02T15:31:59.263620 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 53 bytes from queue.
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 53. Returning partial and re-queuing 52 bytes.
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 52 bytes from queue.
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 52. Returning partial and re-queuing 51 bytes.
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 51 bytes from queue.
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 51. Returning partial and re-queuing 50 bytes.
2026-02-02T15:31:59.264730 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 50 bytes from queue.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 50. Returning partial and re-queuing 49 bytes.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 49 bytes from queue.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 49. Returning partial and re-queuing 48 bytes.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 48 bytes from queue.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 48. Returning partial and re-queuing 47 bytes.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 47 bytes from queue.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 47. Returning partial and re-queuing 46 bytes.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 46 bytes from queue.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 46. Returning partial and re-queuing 45 bytes.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 45 bytes from queue.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 45. Returning partial and re-queuing 44 bytes.
2026-02-02T15:31:59.265248 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 44 bytes from queue.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 44. Returning partial and re-queuing 43 bytes.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 43 bytes from queue.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 43. Returning partial and re-queuing 42 bytes.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 42 bytes from queue.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 42. Returning partial and re-queuing 41 bytes.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 41 bytes from queue.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 41. Returning partial and re-queuing 40 bytes.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 40 bytes from queue.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 40. Returning partial and re-queuing 39 bytes.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 39 bytes from queue.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 39. Returning partial and re-queuing 38 bytes.
2026-02-02T15:31:59.266294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 38 bytes from queue.
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 38. Returning partial and re-queuing 37 bytes.
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 37 bytes from queue.
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 37. Returning partial and re-queuing 36 bytes.
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 36 bytes from queue.
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 36. Returning partial and re-queuing 35 bytes.
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267294 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 35 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 35. Returning partial and re-queuing 34 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 34 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 34. Returning partial and re-queuing 33 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 33 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 33. Returning partial and re-queuing 32 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 32 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 32. Returning partial and re-queuing 31 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 31 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 31. Returning partial and re-queuing 30 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 30 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 30. Returning partial and re-queuing 29 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 29 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 29. Returning partial and re-queuing 28 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 28 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 28. Returning partial and re-queuing 27 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 27 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 27. Returning partial and re-queuing 26 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 26 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 26. Returning partial and re-queuing 25 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 25 bytes from queue.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 25. Returning partial and re-queuing 24 bytes.
2026-02-02T15:31:59.267840 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 24 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 24. Returning partial and re-queuing 23 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 23 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 23. Returning partial and re-queuing 22 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 22 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 22. Returning partial and re-queuing 21 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 21 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 21. Returning partial and re-queuing 20 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 20 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 20. Returning partial and re-queuing 19 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 19 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 19. Returning partial and re-queuing 18 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 18 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 18. Returning partial and re-queuing 17 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 17 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 17. Returning partial and re-queuing 16 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 16 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 16. Returning partial and re-queuing 15 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 15 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 15. Returning partial and re-queuing 14 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 14 bytes from queue.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 14. Returning partial and re-queuing 13 bytes.
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.268853 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 13 bytes from queue.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 13. Returning partial and re-queuing 12 bytes.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 12 bytes from queue.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 12. Returning partial and re-queuing 11 bytes.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 11 bytes from queue.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 11. Returning partial and re-queuing 10 bytes.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 10 bytes from queue.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 10. Returning partial and re-queuing 9 bytes.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 9 bytes from queue.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 9. Returning partial and re-queuing 8 bytes.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 8 bytes from queue.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 8. Returning partial and re-queuing 7 bytes.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 7 bytes from queue.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 7. Returning partial and re-queuing 6 bytes.
2026-02-02T15:31:59.270231 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 6 bytes from queue.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 6. Returning partial and re-queuing 5 bytes.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 5 bytes from queue.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 5. Returning partial and re-queuing 4 bytes.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 4 bytes from queue.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 4. Returning partial and re-queuing 3 bytes.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 3 bytes from queue.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 3. Returning partial and re-queuing 2 bytes.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:31:59.271332 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:31:59.272332 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 30 bytes successfully. Data preview (hex): 001c9d6dcf051704b0f7def13f1a98acaadb8617...
2026-02-02T15:31:59.272332 [FINER] [YamuxStream] [7][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:31:59.272332 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:31:59.272836 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:31:59.272836 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:31:59.272836 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:31:59.272836 [FINER] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Writing 30 bytes: 001cfcfbd4078e993a55578da3d9ecc9b60cc92fab3d455c3528bce6068f
2026-02-02T15:31:59.273840 [FINEST] [TCPConnection] TCPConnection.write (id: b2bbfdac-8aa4-4a94-9037-e1a86ecb0255): Flushed 30 bytes successfully. Data preview (hex): 001cfcfbd4078e993a55578da3d9ecc9b60cc92f...
2026-02-02T15:31:59.273840 [FINER] [YamuxStream] [7][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:31:59.273840 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:31:59.273840 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:31:59.273840 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:31:59.273840 [FINE] [YamuxStream] [7][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:31:59.273840 [FINE] [YamuxStream] [7][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:31:59.273840 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:31:59.273840 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:31:59.273840 [FINE] [Libp2pRouter] [VERBOSE] Message sent successfully to 12D3KooWEi4Mr8FH3jpUzEbKYLxBuWfsmLdGH8vR8idcQHPWQWGF
2026-02-02T15:31:59.273840 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:59.273840 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:59.273840 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:59.273840 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:59.273840 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:59.273840 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:31:59.273840 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:31:59.273840 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:31:59.273840 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:31:59.275346 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:31:59.275346 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:31:59.275346 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
01:06 +966 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:59.275866 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:59.275866 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:31:59.275866 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:59.275866 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:59.275866 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:59.276443 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:31:59.276443 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:31:59.276443 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:59.276443 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:31:59.276443 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:31:59.276443 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c9d6dcf051704b0f7def13f1a98acaadb8617406f66d66481924231f8
2026-02-02T15:31:59.277950 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.278954 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.278954 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.278954 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.278954 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.278954 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.278954 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.278954 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.278954 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.278954 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(d4ed44c5) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:59.278954 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(d4ed44c5) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 9d6dcf051704b0f7def13f1a98acaadb8617406f66d66481924231f8
2026-02-02T15:31:59.278954 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:59.279958 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:59.279958 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b3479883) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:59.279958 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(b3479883) END (from buffer). Returning 28 bytes: 9d6dcf051704b0f7def13f1a98acaadb8617406f66d66481924231f8. Buffer after: 0 bytes: 
2026-02-02T15:31:59.279958 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [157, 109, 207, 5]
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 9d6dcf051704b0f7def13f1a98acaadb8617406f66d66481924231f8
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9d6dcf051704b0f7def13f1a
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 98acaadb8617406f66d66481924231f8
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [157, 109, 207, 5]
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [152, 172, 170, 219]
2026-02-02T15:31:59.279958 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [152, 172, 170, 219, 134, 23, 64, 111, 102, 214, 100, 129, 146, 66, 49, 248]
2026-02-02T15:31:59.279958 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.280957 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:59.280957 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:31:59.280957 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:59.280957 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 33]
2026-02-02T15:31:59.281462 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.281462 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
01:06 +966 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:06 +966 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:31:59.281462 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 33. Current our send window: 524255, New: 524288
2026-02-02T15:31:59.292605 [FINEST] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cfcfbd4078e993a55578da3d9ecc9b60cc92fab3d455c3528bce6068f
2026-02-02T15:31:59.292605 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.292605 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.292605 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.292605 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.292605 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.292605 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.293603 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.293603 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.293603 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.293603 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(6af9b404) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:31:59.293603 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(6af9b404) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: fcfbd4078e993a55578da3d9ecc9b60cc92fab3d455c3528bce6068f
2026-02-02T15:31:59.293603 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:31:59.293603 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:31:59.293603 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:31:59.293603 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:31:59.293603 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:31:59.293603 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:31:59.294110 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:31:59.294110 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f5bbea57) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:31:59.294110 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f5bbea57) END (from buffer). Returning 28 bytes: fcfbd4078e993a55578da3d9ecc9b60cc92fab3d455c3528bce6068f. Buffer after: 0 bytes: 
2026-02-02T15:31:59.294110 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [252, 251, 212, 7]
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: fcfbd4078e993a55578da3d9ecc9b60cc92fab3d455c3528bce6068f
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: fcfbd4078e993a55578da3d9
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ecc9b60cc92fab3d455c3528bce6068f
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [252, 251, 212, 7]
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [236, 201, 182, 12]
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [236, 201, 182, 12, 201, 47, 171, 61, 69, 92, 53, 40, 188, 230, 6, 143]
2026-02-02T15:31:59.294110 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:31:59.294110 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059172674): [170, 138, 118, 255, 144, 129, 31, 149, 122, 67, 77, 113, 154, 132, 191, 121, 211, 69, 244, 50, 60, 170, 157, 53, 115, 43, 3, 254, 114, 148, 60, 29]
2026-02-02T15:31:59.294703 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:31:59.294703 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:31:59.294703 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:31:59.294703 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:31:59.294703 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:31:59.295712 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:31:59.295712 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:31:59.295712 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:31:59.296713 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:31:59.296713 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:31:59.296713 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:31:59.296713 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:31:59.296713 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:31:59.296713 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:31:59.296713 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:31:59.296713 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:31:59.296713 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:31:59.297713 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f46dd529) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:31:59.297713 [FINER] [TCPConnection] TCPConnection(d71c9997-c750-4b05-9a12-92ed21f628d3) - Read(f46dd529) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:31:59.298217 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:31:59.298217 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:31:59.300774 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:31:59.301980 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:31:59.301980 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:59.301980 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:31:59.303044 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:59.303044 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - Initial _network.listenAddresses: []
2026-02-02T15:31:59.303044 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB, Host hashCode: 382915435
2026-02-02T15:31:59.304045 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:59.304045 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:31:59.304045 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:31:59.304045 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:31:59.304045 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:31:59.305168 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
01:07 +967 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +968 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +969 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +970 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +971 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +972 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +973 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +974 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +975 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +976 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +977 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +978 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +979 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +979 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:32:00.183125 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:32:00.183125 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:32:00.183125 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:32:00.183125 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:32:00.184125 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:32:00.184125 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:32:00.184125 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:32:00.184125 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:32:00.184125 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:32:00.185125 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:32:00.186125 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:32:00.186125 [INFO] [Config] [Config.newNode] for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB: Host created. Listening will be handled by host.start().
2026-02-02T15:32:00.186125 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:32:00.186125 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB, network.hashCode: 608678882, initial network.listenAddresses: []
2026-02-02T15:32:00.186125 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:32:00.186125 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:32:00.186125 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:32:00.186125 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.186125 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:32:00.187124 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.187124 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.187124 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
2026-02-02T15:32:00.491465 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58553 for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.491465 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58553
2026-02-02T15:32:00.492999 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58553. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58553] for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.492999 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.492999 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58553 for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB. This should be resolved to concrete addresses by the host.
2026-02-02T15:32:00.492999 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.492999 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58553
2026-02-02T15:32:00.492999 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB.
2026-02-02T15:32:00.492999 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.492999 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.492999 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.492999 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.492999 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.492999 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.492999 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:32:00.494003 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.495002 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.495002 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.495002 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.495002 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58553
2026-02-02T15:32:00.495002 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58553
2026-02-02T15:32:00.497782 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.497782 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.497782 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.497782 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - resolvedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.498288 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.498288 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.498288 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - Returning: [/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553]
2026-02-02T15:32:00.505626 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:32:00.505626 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.505626 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 608678882, network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.508257 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:32:00.509260 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB, Host hashCode: 382915435
2026-02-02T15:32:00.509260 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.509888 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.509888 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.509888 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.509888 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58553
2026-02-02T15:32:00.509888 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58553
2026-02-02T15:32:00.509888 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.509888 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.509888 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.509888 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - resolvedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.509888 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.509888 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.510891 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - Returning: [/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553]
2026-02-02T15:32:00.510891 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.510891 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:32:00.510891 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:32:00.510891 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB, Host hashCode: 382915435
2026-02-02T15:32:00.510891 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.510891 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.510891 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.510891 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.510891 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58553
2026-02-02T15:32:00.510891 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58553
2026-02-02T15:32:00.512891 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.512891 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.512891 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.514395 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - resolvedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.514395 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.514395 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.514395 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - Returning: [/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553]
2026-02-02T15:32:00.514395 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.515398 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:32:00.516399 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:32:00.516399 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:32:00.516399 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.516399 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 608678882, network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.516399 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.516399 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 608678882, network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.516399 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.516399 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:32:00.516399 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB, Host hashCode: 382915435
2026-02-02T15:32:00.516399 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.516399 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.516399 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.516399 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.517772 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58553
2026-02-02T15:32:00.517772 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58553 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58553
2026-02-02T15:32:00.517772 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.518775 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58553 (first component not IP)
2026-02-02T15:32:00.518775 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:32:00.518775 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - resolvedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.518775 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.518775 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553}
2026-02-02T15:32:00.518775 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB - Returning: [/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553]
2026-02-02T15:32:00.518775 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58553, /ip4/172.29.112.1/tcp/58553] for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.518775 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.518775 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.518775 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 608678882, network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.518775 [FINE] [basichost] HolePunch service started.
2026-02-02T15:32:00.518775 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.518775 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 608678882, network.listenAddresses: [/ip4/0.0.0.0/tcp/58553]
2026-02-02T15:32:00.520279 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:32:00.520279 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:32:00.520279 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWQxWd3TD2MknXgZgeFh2dpkhugkSAPwN4FUcmHC41EiWB
2026-02-02T15:32:00.520279 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:32:00.520279 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:32:00.521297 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:32:00.521297 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:32:00.522296 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:32:00.522296 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:32:00.522296 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:32:00.522801 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:32:00.522801 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:32:00.522801 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:32:00.522801 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:32:00.522801 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:32:00.522801 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:32:00.542394 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:32:00.542394 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.542394 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.543397 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 20ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.543397 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 22ms (dial: 21ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.543397 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:32:00.543397 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.543397 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:32:00.543397 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:32:00.544399 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:32:00.544399 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:32:00.544399 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:32:00.544399 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:32:00.544399 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:32:00.546905 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:32:00.546905 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.546905 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.546905 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.546905 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 3ms (dial: 3ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.547904 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:32:00.547904 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.547904 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:32:00.547904 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:32:00.547904 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:32:00.547904 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:32:00.548903 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:32:00.548903 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:32:00.548903 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:32:00.548903 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:32:00.548903 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.548903 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.548903 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 0ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.548903 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 0ms (dial: 0ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.548903 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:32:00.548903 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.550407 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:32:00.550407 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:32:00.550407 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:32:00.550407 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:32:00.550407 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:32:00.550407 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:32:00.551411 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:32:00.551411 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:32:00.551411 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.551411 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.551411 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.551411 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:215:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:32:00.551411 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:32:00.552410 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:32:00.552410 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:32:00.552410 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:32:00.552410 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:32:00.552410 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:32:00.552410 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:32:00.552410 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:32:00.552410 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
01:08 +980 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage receiveMessages should return same stream
01:08 +980 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:32:00.553349 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:32:00.553349 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:32:00.553349 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:32:00.553349 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:32:00.553349 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
01:08 +981 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage event methods management
01:08 +982 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage parseMultiaddr and resolvePeerId
01:08 +982 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:32:00.561339 [WARNING] [Libp2pRouter] [WARNING] Failed to parse multiaddr: invalid
01:08 +983 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage methods should throw if not started
01:08 +984 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage protocol management
01:08 +984 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:32:00.566078 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /p
2026-02-02T15:32:00.566078 [FINE] [Libp2pRouter] [DEBUG] Removed protocol handler for /p
2026-02-02T15:32:00.568082 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /new
01:08 +985 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 toBase58 encodes correctly with z prefix
01:08 +986 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 fromBase58 throws on empty string
01:08 +987 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 fromBase58 throws on invalid prefix
01:08 +988 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 fromBase58 throws on unsupported supported prefix
01:08 +989 -4: test\utils\encoding_utils_test.dart: EncodingUtils CID Validation isValidCIDBytes returns true for valid CIDv0
01:08 +990 -4: test\utils\encoding_utils_test.dart: EncodingUtils CID Validation isValidCIDBytes handles invalid data gracefully
01:08 +991 -4: test\utils\encoding_utils_test.dart: EncodingUtils Codecs getCodecFromCode returns correct strings
01:08 +992 -4: test\utils\encoding_utils_test.dart: EncodingUtils Codecs getCodeFromCodec returns correct codes
01:08 +993 -4: test\utils\encoding_utils_test.dart: EncodingUtils Codecs getCodecFromCode throws on unknown code
01:08 +994 -4: test\utils\encoding_utils_test.dart: EncodingUtils Codecs getCodeFromCodec throws on unknown codec
01:08 +995 -4: test\utils\encoding_utils_test.dart: EncodingUtils Codecs supportedCodecs list is not empty
01:08 +996 -4: test\utils\encoding_utils_test.dart: EncodingUtils Multibase isValidMultibasePrefix correctly identifies prefixes
01:08 +997 -4: test\utils\encoding_utils_test.dart: EncodingUtils Multibase getEncodingFromPrefix returns correct encoding name
01:09 +998 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +999 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns unique IDs
01:09 +1000 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns UUID v4 format
01:09 +1001 -4: test\utils\generate_message_id_test.dart: MessageId Generator multiple calls generate different IDs
01:09 +1002 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache basic operations puts and gets values
01:09 +1003 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache basic operations returns null for missing keys
01:09 +1004 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache basic operations updates existing values
01:09 +1005 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache basic operations reports correct length
01:09 +1006 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache eviction evicts LRU when at capacity
01:09 +1007 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache eviction get updates LRU order
01:09 +1008 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache eviction calls onEvict callback
01:09 +1009 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache remove removes existing key
01:09 +1010 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache remove returns null for missing key
01:09 +1011 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache clear removes all entries
01:09 +1012 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache clear calls onEvict for all entries
01:09 +1013 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache getOrCompute returns cached value if exists
01:09 +1014 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache getOrCompute computes and caches if missing
01:09 +1015 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache containsKey returns true for existing keys
01:09 +1016 -4: test\utils\generic_lru_cache_test.dart: TimedLRUCache expires entries after TTL
01:09 +1017 -4: test\utils\generic_lru_cache_test.dart: TimedLRUCache fresh entries are not expired
01:09 +1018 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.039126 [INFO] [Keystore] [INFO] Added key pair for test.
01:09 +1019 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1020 -4: test\utils\keystore_test.dart: Keystore remove key pair
01:09 +1020 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.101108 [INFO] [Keystore] [INFO] Added key pair for test.
2026-02-02T15:32:02.102113 [INFO] [Keystore] [INFO] Removed key pair for test.
01:09 +1021 -4: test\utils\keystore_test.dart: Keystore remove non-existent key pair (warning path)
01:09 +1021 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.137946 [WARNING] [Keystore] [WARNING] No key pair found for missing to remove.
01:09 +1022 -4: test\utils\keystore_test.dart: Keystore listKeyPairs
01:09 +1022 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.140946 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:32:02.140946 [INFO] [Keystore] [INFO] Added key pair for k2.
01:09 +1023 -4: test\utils\keystore_test.dart: Keystore serialize and deserialize
01:09 +1023 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.160532 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:32:02.173929 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:32:02.173929 [INFO] [Keystore] [INFO] Keystore deserialized from JSON.
01:09 +1024 -4: test\utils\keystore_test.dart: Keystore withConfig named constructor
01:09 +1025 -4: test\utils\keystore_test.dart: Keystore privateKey getter (defaultKeyName)
01:09 +1025 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.182436 [INFO] [Keystore] [INFO] Added key pair for self.
01:09 +1026 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1027 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1028 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1029 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1030 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1031 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1032 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1033 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1034 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1035 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1036 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1037 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1038 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1039 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:10 +1040 -4: test\utils\logger_test.dart: Logger Timestamp Format uses ISO8601 format
01:10 +1041 -4: test\utils\keystore_test.dart: Keystore verifySignature - base64 pubkey
01:10 +1042 -4: test\utils\keystore_test.dart: Keystore verifySignature - base64 pubkey
01:10 +1043 -4: test\utils\keystore_test.dart: Keystore verifySignature - base64 pubkey
01:10 +1044 -4: test\utils\keystore_test.dart: Keystore verifySignature - base64 pubkey
01:10 +1045 -4: test\utils\keystore_test.dart: Keystore verifySignature - raw string fallback
01:10 +1045 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.405108 [WARNING] [Keystore] [WARNING] Invalid key format for verification: Algorithm ed25519 expects a public key with 32 bytes, but got: 9 bytes
01:10 +1046 -4: test\utils\keystore_test.dart: Keystore exportKeysForMigration and clearAfterMigration
01:10 +1046 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:32:02.408104 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:32:02.409609 [INFO] [Keystore] [INFO] Added key pair for k2.
2026-02-02T15:32:02.409609 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:32:02.411617 [INFO] [Keystore] [INFO] Plaintext keystore cleared after migration
01:10 +1047 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests generateMessageId returns non-empty string
01:10 +1048 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests generateMessageId creates unique IDs
01:10 +1049 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests generateMessageId format is consistent
01:10 +1050 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests concurrent ID generation produces unique IDs
01:10 +1051 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests IDs remain unique across batches
01:10 +1052 -4: test\utils\private_key_test.dart: IPFSPrivateKey generate and sign/verify roundtrip
01:10 +1053 -4: test\utils\varint_test.dart: Varint encode/decode small integers
01:10 +1054 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromString and sign/verify
01:10 +1055 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromString and sign/verify
01:10 +1056 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromString and sign/verify
01:10 +1057 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromString and sign/verify
01:10 +1058 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromBytes - ECDSA
01:10 +1059 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromBytes - Unsupported algorithm
01:10 +1060 -4: test\utils\private_key_test.dart: IPFSPrivateKey signature verification failure on wrong data
01:10 +1061 -4: test\utils\private_key_test.dart: IPFSPrivateKey publicKeyBytes for non-ECDSA (theoretical)
01:11 +1062 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:32:03.414527 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:32:03.420610 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:32:03.420610 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.420610 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.422113 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:32:03.425843 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:32:03.426349 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:32:03.428384 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:32:03.428384 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:32:03.429388 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:32:03.429892 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.429892 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:32:03.432054 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:32:03.437793 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1063 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should add and retrieve content
01:11 +1063 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:32:03.453782 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:32:03.453782 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:32:03.454339 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.455426 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.455426 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:32:03.455940 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:32:03.455940 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:32:03.455940 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:32:03.455940 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:32:03.455940 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:32:03.455940 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.457455 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:32:03.457455 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:32:03.541108 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1064 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should handle pinning
01:11 +1064 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:32:03.544268 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:32:03.546029 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:32:03.546029 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.547548 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.547548 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:32:03.547548 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:32:03.548552 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:32:03.548552 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:32:03.549056 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:32:03.549056 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:32:03.549056 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.549056 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:32:03.550059 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:32:03.596741 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1065 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should addStream and retrieve content
01:11 +1065 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:32:03.601003 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:32:03.601556 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:32:03.601556 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.601556 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.602475 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:32:03.602987 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:32:03.602987 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:32:03.602987 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:32:03.602987 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:32:03.602987 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:32:03.602987 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:32:03.603990 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:32:03.603990 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:32:03.654322 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1066 -4: Some tests failed.

Consider enabling the flag chain-stack-traces to receive more detailed exceptions.
For example, 'dart test --chain-stack-traces'.
